Webinar Recording – Using Live Data to Stop ATO
- Don Bush
- 2 days ago
- 3 min read
According to the 2025 Verizon Data Breach Incident Report, credential abuse (i.e., credential stuffing, account takeover attacks, etc.) is the leading initial attack vector and is up over 22%. Credential screening – evaluating credentials for potential compromise at various points, including login, signup, and account reset – is a best practice for enhancing security measures to fight these types of attacks.
Many organizations use breach data to screen against compromised credentials. However, using breach data alone for credential screening can result in higher false positives rates, poor user experiences, and increased fraud remediation costs.
Why? Here’s a breakdown of breach data compared to live data.
Breach Data | Live Data |
---|---|
Can be months or even years old – Data breaches are not always known right away nor is the data available immediately. This means the data accessed by criminals could have been in use for weeks, months, or years before it is available for credential screening. | Provides recent activity – Data gathered through live channels is actively being used by criminals and can be used for credential screening immediately, demonstrating a clear threat in real time. |
Known to criminals & corporations – Data from breaches is known to both criminals and corporations which diminishes the effectiveness of credential screening. | Known only to mNW – Live data is known only to myNetWatchman which makes it more accurate and more actionable when conducting credential screening. 100% of the live data presented by myNetWatchman is criminal activity and shows a higher risk of account compromise. |
Everyone’s data has been breached – With more than 12,000 data breaches in 2024 alone, it is a safe bet that everyone’s data has been breached in the past few years and is available on the dark web. So, credential screening with breach data alone can be lacking in actionable information and in determining where the highest risk is. | Not everyone’s data is being used – Knowing whose data is actively being tested and used by criminals is far more predictive of risk and account compromise. Credential screening with live data results in zero false positives and a better customer experience. |
Comes in batches – Breach data generally comes in batches and needs to be constantly updated to get the latest data available. | Seen in real-time – Live data is delivered in real time via an API with the most recent activity on over 38 billion credential pairs highlighting risk immediately. No updating necessary. |
Doesn’t require monitoring – Breach data is not real time, so monitoring is not a factor. | Monitoring for compromised credentials – myNetWatchman constantly monitors for criminal activity to ensure the latest data is available and delivered in real time. |
mNW improves breach data by adding “live data”, enhancing detection of compromised credentials linked to criminal activity. This helps companies prevent account takeovers and other fraud events.
The difference between using typical breach data and live data for your credential screening can make a significant difference.
In this webinar we reviewed
The problems of using breach data alone
What does “live data” add to enhance fraud detection?
Two case studies highlighting the increased levels of accuracy for preventing ATO
Audience Q&A
Presenters:

David is the CEO of myNetWatchman and an experienced risk and security executive and GM with highly specialized skills in eCommerce, fintech, payments, fraud, risk and security. For more than 20 years, David has applied his skills in executive positions at leading technology companies like Amazon, Expedia, IBM and consulting firms like The Fraud Practice, Inc. A true technology leader, David blends business acumen, empathy and technical expertise to solve the toughest challenges facing enterprises today.

Jen is the COO at myNetWatchman and a seasoned technology professional with a passion for fighting fraud. Experienced in management, data analysis, and investigations in cyber and identity fraud, specialty retail loss prevention, contract fraud, litigation support, and due diligence projects. Jen’s time at Cars.com and CareerBuilder managing Fraud Prevention and Site Security respectively give her an insider's view of what really happens when criminals target your organization.
Watch the webinar by clicking here.
コメント