top of page

Webinar Recording – Using Live Data to Stop ATO

  • Don Bush
  • 2 days ago
  • 3 min read

According to the 2025 Verizon Data Breach Incident Report, credential abuse (i.e., credential stuffing, account takeover attacks, etc.) is the leading initial attack vector and is up over 22%. Credential screening – evaluating credentials for potential compromise at various points, including login, signup, and account reset – is a best practice for enhancing security measures to fight these types of attacks.


Many organizations use breach data to screen against compromised credentials. However, using breach data alone for credential screening can result in higher false positives rates, poor user experiences, and increased fraud remediation costs.


Why? Here’s a breakdown of breach data compared to live data.

Breach Data

Live Data

Can be months or even years old

Data breaches are not always known right away nor is the data available immediately. This means the data accessed by criminals could have been in use for weeks, months, or years before it is available for credential screening.

Provides recent activity

Data gathered through live channels is actively being used by criminals and can be used for credential screening immediately, demonstrating a clear threat in real time.

Known to criminals & corporations

Data from breaches is known to both criminals and corporations which diminishes the effectiveness of credential screening.

Known only to mNW

Live data is known only to myNetWatchman which makes it more accurate and more actionable when conducting credential screening. 100% of the live data presented by myNetWatchman is criminal activity and shows a higher risk of account compromise.

Everyone’s data has been breached

With more than 12,000 data breaches in 2024 alone, it is a safe bet that everyone’s data has been breached in the past few years and is available on the dark web. So, credential screening with breach data alone can be lacking in actionable information and in determining where the highest risk is.

Not everyone’s data is being used

Knowing whose data is actively being tested and used by criminals is far more predictive of risk and account compromise. Credential screening with live data results in zero false positives and a better customer experience.

Comes in batches

Breach data generally comes in batches and needs to be constantly updated to get the latest data available.

Seen in real-time

Live data is delivered in real time via an API with the most recent activity on over 38 billion credential pairs highlighting risk immediately. No updating necessary.

Doesn’t require monitoring

Breach data is not real time, so monitoring is not a factor.

Monitoring for compromised credentials

myNetWatchman constantly monitors for criminal activity to ensure the latest data is available and delivered in real time.

mNW improves breach data by adding “live data”, enhancing detection of compromised credentials linked to criminal activity. This helps companies prevent account takeovers and other fraud events.


The difference between using typical breach data and live data for your credential screening can make a significant difference.


In this webinar we reviewed

  • The problems of using breach data alone

  • What does “live data” add to enhance fraud detection?

  • Two case studies highlighting the increased levels of accuracy for preventing ATO

  • Audience Q&A

Presenters:

ree

David is the CEO of myNetWatchman and an experienced risk and security executive and GM with highly specialized skills in eCommerce, fintech, payments, fraud, risk and security. For more than 20 years, David has applied his skills in executive positions at leading technology companies like Amazon, Expedia, IBM and consulting firms like The Fraud Practice, Inc. A true technology leader, David blends business acumen, empathy and technical expertise to solve the toughest challenges facing enterprises today.

ree

Jen is the COO at myNetWatchman and a seasoned technology professional with a passion for fighting fraud. Experienced in management, data analysis, and investigations in cyber and identity fraud, specialty retail loss prevention, contract fraud, litigation support, and due diligence projects. Jen’s time at Cars.com and CareerBuilder managing Fraud Prevention and Site Security respectively give her an insider's view of what really happens when criminals target your organization.

Watch the webinar by clicking here.

コメント

5つ星のうち0と評価されています。
まだ評価がありません

評価を追加
bottom of page