top of page


Your MFA Is Only As Strong As Your Weakest Inbox
Multi-factor autentication was supposed tobe the answer to the password problem. But when the second factor routes through the same compromised email address, you haven't added security, you've just added steps. 85% of breached orgs had bot detection 62% were successfully breached anyway $5 M average cost per ATO breach Every security team in America will tell you the same thing: enable MFA. It’s become the first commandment of enterprise cyber hygiene, the baseline recommend
Don Bush
Apr 14 min read


Your Email Address Is Not Your Identity. You Just Think It Is.
The $15.6 billion mistake hiding in plain sight, and why fixing it starts with questioning the premise. Every morning, hundreds of millions of people prove who they are to their bank, their employer, their insurance company, their investment platform. They do it with the same mechanism they've used for decades: an email address and a password. The system sends a link. The link arrives. The system says: identity confirmed. Access granted. It sounds reasonable. It is, in fact,
Don Bush
Mar 254 min read


New Special Report: The Lying Gatekeeper
Despite not being designed for identity verification, email's convenience made it a common business identifier. Criminals target this pervasive use as a primary entry point for their activities. Read the newly published report, The Lying Gatekeeper, to explore these topics
Don Bush
Mar 182 min read


The Digital Identity Paradox: Why Your Email Is the Weakest Link in the Trust Chain
Executive Brief Email was never built to be your digital passport. Created as a simple, open-network protocol for exchanging messages between trusted parties, it lacked the foundational architecture for authentication, financial security, or identity verification. Yet, today, email has quietly become the "de facto" primary identifier for billions of users. From resetting bank passwords to approving high-value transactions, the email address is the gatekeeper of the digital ec
Don Bush
Mar 33 min read


The Digital Identity Paradox: Why Email Verification is the New Security Frontier
In the modern digital economy, the email address has transcended its original purpose as a communication tool. It has become the near-universal unique identifier—the primary digital ID for billions of users. From financial services to SaaS products, the email address is the default gatekeeper for account creation, password resets, and high-value transactions. However, this reliance has created a dangerous security paradox: while email is treated as a permanent, trusted anchor
Don Bush
Feb 103 min read


Holiday Fraud Is Just the Beginning: How Criminals Use Peak Season to Build Sleeper Accounts for Year-Round Abuse
Yes, criminal activity spikes during peak shopping season. But the most damaging fraud often doesn’t happen in November or December. It happens months later, after the holidays have passed and attention has shifted, using accounts that were created, compromised, or harvested during peak volume. Fraudsters don’t treat the holidays as a sprint, they treat them as account setup season. Fraudsters use the holidays to set up sleeper accounts and synthetic identities, and to harves
Don Bush
Jan 135 min read


The Klarna Wake-Up Call: Why Ignoring Email Authentication Is a Disaster Waiting to Happen
Klarna is just now learning what many in fraud prevention have known for years: synthetic identity fraud doesn’t start with stolen credit cards, it starts with unvetted digital identities. For years, email addresses have been treated as little more than a communication channel, a box to check during account creation. That assumption is now proving to be dangerously outdated . Email is often the first persistent identifier tied to consumer, vendor, and partner accounts. When e
Don Bush
Jan 73 min read


The Critical Visibility Gap Between Marketplace Data and Checker, Real-Time Data Intelligence
Across the payments ecosystem, criminals need validated, “live” cards because stolen cards are the fuel for almost every form of online payment fraud. The sooner they confirm which cards work, the sooner they can monetize them and fraud can hide more easily. These cards include traditional consumer Visa and Mastercard branded cards from issuing banks, private label, commercial, and even gift cards. But here’s the problem: many organizations, including banks, don’t see these
Don Bush
Nov 26, 20253 min read


From Cyber Sleuthing to Global Spotlight, Lawrence Baldwin’s Story Featured in BBC Podcast Series
We’re thrilled to share some exciting news: our founder, Lawrence Baldwin , is featured in a gripping new BBC World Service podcast series that dives deep into one of the most remarkable true stories in cyber history. Listen to Cyber Hack “Evil Corp”: https://www.bbc.com/audio/brand/w13xtvg9 About the Series The BBC’s Cyber Hack series “Evil Corp” takes listeners inside the high-stakes world of international cybercrime, where hackers, governments, and investigators cross
Don Bush
Nov 5, 20251 min read


myNetWatchman Launches the Travel Credential Abuse Index
The First Industry Benchmark on Cyber Threats Targeting Global Travel Brands Savannah, GA, October 21, 2025 — myNetWatchman today announced the release of the Travel Credential Abuse Index (TCAI) Report , a first-of-its-kind benchmark tracking credential-based cyberattacks across airlines, hotels, online travel agencies (OTAs), and car rental companies. The report delivers unprecedented visibility into how credential abuse has evolved over the past two years, revealing that
Don Bush
Oct 29, 20252 min read


MFA Isn’t a Fortress: Why Compromised Emails Undermine Account Security
If you’ve worked in fraud prevention or cybersecurity, you’ve probably heard it a thousand times: “Just turn on multi-factor...
Don Bush
Oct 8, 20254 min read


From Trusted to Threat: The Hidden Risks of Verified Accounts
Why Continuous Monitoring Is Essential for Account Protection Business leaders and fraud managers invest significant resources in...
Don Bush
Oct 1, 20253 min read


Email Hygiene: A Hidden Lever in Reducing Fake Accounts & Improving Business Metrics
Every executive decision relies on trustworthy numbers. Metrics like CAC (Customer Acquisition Cost), CLTV (Customer Lifetime Value),...
Don Bush
Sep 24, 20253 min read


Sleeper Accounts Are Waking Up, Right on Cue for iPhone 17 Pre-Orders & Holidays
Apple just opened iPhone 17 pre-orders (stores launch September 19), and history has shown that fraudsters treat new-phone hype and...
Don Bush
Sep 17, 20253 min read


The Real Economics of Credential Stuffing: Low Success, High Impact
(Excerpts from the recently published Special Report, “ The Economics of Credential Stuffing Attacks and Account Takeover Fraud ” by...
Don Bush
Sep 10, 20252 min read


Is Your Business a Target for Credential Stuffing?
Credential stuffing is a serious cyberattack because it’s cheap, easy to scale, and takes advantage of the common problem of people...
Don Bush
Sep 5, 20251 min read


Mind the Gap in Your Verification Analysis
Bridging the Divide Between Breach Data and Actionable Intelligence It has been a year since the massive AT&T data breach shook the...
Don Bush
Aug 27, 20252 min read


The Rising Threat of Business Email Compromise
Cybercrime is evolving faster than ever, and Business Email Compromise (BEC) stands out as one of the most insidious threats. Unlike...
Don Bush
Aug 21, 20251 min read


Webinar Recording – Using Live Data to Stop ATO
According to the 2025 Verizon Data Breach Incident Report, credential abuse (i.e., credential stuffing, account takeover attacks, etc.)...
Don Bush
Aug 13, 20253 min read


Evolving Landscape of Cyber Threats Necessitates Advanced Risk Assessment for Cyber Insurers
Cyber insurance is a critical tool for businesses to mitigate financial losses from cyberattacks. However, insurers' traditional approach...
Don Bush
Jul 31, 20251 min read
bottom of page
