top of page


Your Email Address Is Not Your Identity. You Just Think It Is.
The $15.6 billion mistake hiding in plain sight, and why fixing it starts with questioning the premise. Every morning, hundreds of millions of people prove who they are to their bank, their employer, their insurance company, their investment platform. They do it with the same mechanism they've used for decades: an email address and a password. The system sends a link. The link arrives. The system says: identity confirmed. Access granted. It sounds reasonable. It is, in fact,
Don Bush
6 hours ago4 min read


New Special Report: The Lying Gatekeeper
Despite not being designed for identity verification, email's convenience made it a common business identifier. Criminals target this pervasive use as a primary entry point for their activities. Read the newly published report, The Lying Gatekeeper, to explore these topics
Don Bush
Mar 182 min read


The Digital Identity Paradox: Why Your Email Is the Weakest Link in the Trust Chain
Executive Brief Email was never built to be your digital passport. Created as a simple, open-network protocol for exchanging messages between trusted parties, it lacked the foundational architecture for authentication, financial security, or identity verification. Yet, today, email has quietly become the "de facto" primary identifier for billions of users. From resetting bank passwords to approving high-value transactions, the email address is the gatekeeper of the digital ec
Don Bush
Mar 33 min read


The Digital Identity Paradox: Why Email Verification is the New Security Frontier
In the modern digital economy, the email address has transcended its original purpose as a communication tool. It has become the near-universal unique identifier—the primary digital ID for billions of users. From financial services to SaaS products, the email address is the default gatekeeper for account creation, password resets, and high-value transactions. However, this reliance has created a dangerous security paradox: while email is treated as a permanent, trusted anchor
Don Bush
Feb 103 min read


Holiday Fraud Is Just the Beginning: How Criminals Use Peak Season to Build Sleeper Accounts for Year-Round Abuse
Yes, criminal activity spikes during peak shopping season. But the most damaging fraud often doesn’t happen in November or December. It happens months later, after the holidays have passed and attention has shifted, using accounts that were created, compromised, or harvested during peak volume. Fraudsters don’t treat the holidays as a sprint, they treat them as account setup season. Fraudsters use the holidays to set up sleeper accounts and synthetic identities, and to harves
Don Bush
Jan 135 min read


The Klarna Wake-Up Call: Why Ignoring Email Authentication Is a Disaster Waiting to Happen
Klarna is just now learning what many in fraud prevention have known for years: synthetic identity fraud doesn’t start with stolen credit cards, it starts with unvetted digital identities. For years, email addresses have been treated as little more than a communication channel, a box to check during account creation. That assumption is now proving to be dangerously outdated . Email is often the first persistent identifier tied to consumer, vendor, and partner accounts. When e
Don Bush
Jan 73 min read


MFA Isn’t a Fortress: Why Compromised Emails Undermine Account Security
If you’ve worked in fraud prevention or cybersecurity, you’ve probably heard it a thousand times: “Just turn on multi-factor...
Don Bush
Oct 8, 20254 min read


Email Hygiene: A Hidden Lever in Reducing Fake Accounts & Improving Business Metrics
Every executive decision relies on trustworthy numbers. Metrics like CAC (Customer Acquisition Cost), CLTV (Customer Lifetime Value),...
Don Bush
Sep 24, 20253 min read


Sleeper Accounts Are Waking Up, Right on Cue for iPhone 17 Pre-Orders & Holidays
Apple just opened iPhone 17 pre-orders (stores launch September 19), and history has shown that fraudsters treat new-phone hype and...
Don Bush
Sep 17, 20253 min read


The Rising Threat of Business Email Compromise
Cybercrime is evolving faster than ever, and Business Email Compromise (BEC) stands out as one of the most insidious threats. Unlike...
Don Bush
Aug 21, 20251 min read


The Achilles' Heel of Online Security: Why Passwords Leave Companies Vulnerable
In our digital-first world, passwords, combined with an email address or User ID, are the primary gatekeepers to vast amounts of...
Don Bush
Jun 25, 20253 min read


From Inbox to Outbreak: The BEC and FTF Epidemic
#emailfraud, #bec, #emailreputation
Grace Howard
May 14, 20253 min read


Special Holiday Introductory offer from myNetWatchman
Don’t let increased holiday fraud get you. Now until 1/31/2025 get unlimited use of mNW’s Email Reputation portal at a low one-time cost
Rob Long
Nov 14, 20242 min read


How Bad Actors Take Over Email Accounts
Email accounts are high-value targets for cybercriminals. Read about their takeover tactics and how Email Reputation tools can help
Rob Long
Nov 14, 20244 min read


Beyond the Inbox: The Far-Reaching Impact of Email Compromise
Email is a prime hacker target. Compromised emails can mean data theft, financial loss, & brand damage. Learn how to protect your business
David Montague
Oct 31, 20244 min read


Anatomy of Email Compromise
Protect your castle! Compromised emails put data & accounts at risk. Businesses using email for 2FA need a new approach. #cybersecurity
Karen Simmons
Oct 23, 20243 min read
bottom of page
