According to the 2025 Verizon Data Breach Incident Report, credential abuse (credential stuffing, account takeover attacks, etc.) is the leading initial attack vector — up over 22%. Credential screening — evaluating credentials for potential compromise at login, signup, and account reset — is a best practice for enhancing security measures to fight these types of attacks.
Many organizations use breach data to screen against compromised credentials. However, using breach data alone can result in higher false positive rates, poor user experiences, and increased fraud remediation costs.
Breach Data vs. Live Data
Breach Data can be months or even years old — breaches aren’t always known right away, nor is the data immediately available. This means the data accessed by criminals could have been in use for weeks, months, or years before it’s available for credential screening. It’s also known to both criminals and corporations, which diminishes its effectiveness. With more than 12,000 data breaches in 2024 alone, it’s a safe bet that nearly everyone’s data has been breached — making breach data alone lacking in actionable information for determining where the highest risk actually is.
Live Data provides recent activity — data gathered through live channels is actively being used by criminals and can be used for credential screening immediately, demonstrating a clear threat in real time. It’s known only to myNetWatchman, which makes it more accurate and more actionable. 100% of the live data is criminal activity and shows a higher risk of account compromise. Live data results in zero false positives and a better customer experience.
In This Webinar
- The problems of using breach data alone
- What does “live data” add to enhance fraud detection?
- Two case studies highlighting the increased levels of accuracy for preventing ATO
- Audience Q&A
Presenters:
David Montague — CEO of myNetWatchman; 20+ years in executive positions at Amazon, Expedia, IBM, and consulting firms like The Fraud Practice, Inc.
Jen Baldwin — COO at myNetWatchman; experienced in cyber and identity fraud, specialty retail loss prevention, and site security at Cars.com and CareerBuilder.
The mechanics of how email became the digital economy’s most consequential vulnerability, the case studies that should have changed everything, and what a continuous intelligence approach actually looks like — all documented in “The Lying Gatekeeper,” a special report from myNetWatchman.
Read the Full Report →