top of page


MFA Isn’t a Fortress: Why Compromised Emails Undermine Account Security
If you’ve worked in fraud prevention or cybersecurity, you’ve probably heard it a thousand times: “Just turn on multi-factor...
Don Bush
Oct 84 min read


From Trusted to Threat: The Hidden Risks of Verified Accounts
Why Continuous Monitoring Is Essential for Account Protection Business leaders and fraud managers invest significant resources in...
Don Bush
Oct 13 min read


Email Hygiene: A Hidden Lever in Reducing Fake Accounts & Improving Business Metrics
Every executive decision relies on trustworthy numbers. Metrics like CAC (Customer Acquisition Cost), CLTV (Customer Lifetime Value),...
Don Bush
Sep 243 min read


The Achilles' Heel of Online Security: Why Passwords Leave Companies Vulnerable
In our digital-first world, passwords, combined with an email address or User ID, are the primary gatekeepers to vast amounts of...
Don Bush
Jun 253 min read


Email: More Dangerous than Ever
Most businesses and people assume email is secure. It is not. Every year millions of compromised email accounts are used by fraudsters....
Don Bush
Jun 43 min read


Anyone Can Get Phished
#phishing #itcanhappentoanyone #fraudprevention
Jen Baldwin
Apr 22 min read


Special Holiday Introductory offer from myNetWatchman
Don’t let increased holiday fraud get you. Now until 1/31/2025 get unlimited use of mNW’s Email Reputation portal at a low one-time cost
Rob Long
Nov 14, 20242 min read


How Bad Actors Take Over Email Accounts
Email accounts are high-value targets for cybercriminals. Read about their takeover tactics and how Email Reputation tools can help
Rob Long
Nov 14, 20244 min read


Beyond the Inbox: The Far-Reaching Impact of Email Compromise
Email is a prime hacker target. Compromised emails can mean data theft, financial loss, & brand damage. Learn how to protect your business
David Montague
Oct 31, 20244 min read


Anatomy of Email Compromise
Protect your castle! Compromised emails put data & accounts at risk. Businesses using email for 2FA need a new approach. #cybersecurity
Karen Simmons
Oct 23, 20243 min read
bottom of page