NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
August 20, 2014

3 Ways That Device Identification Prevents Account Takeover

Justin Fimlaid Justin Fimlaid

In 2012, Account Takeover (one mechanism of conducting Fraud) accounted for $4.9 Billion in consumer and merchant losses, which is a 69% increase from 2011 according to “2013 Identity Fraud Report: Data Breaches Becoming a Treasure Trove for Fraudsters" conducted by Javelin Strategy and Research.

Account Takeover in the most simple of definitions is compromising a users account via stealing their log in credentials. We've seen enormous spikes in Account Takeover primarily stemming from password stealing malware in email attachments, clicking on unknown links in email or while web browsing, and public wi-fi hotspots to name a few.

Commonly when an account has been compromised the Fraudster can access payment information, change email addresses (to redirect notifications), and change shipping addresses which are all unknown changes to the original account holder.

One defense mechanism for any merchant suffering from this problem is capturing Device Identification. The presence of an intelligent Device Identification (also known as Device Fingerprinting or PC Fingerprint) strategy can be one sharp arrow in the quiver of any website. It is quite simple, and remarkably effective as one of many layered fraud prevention tactics. Device Identification is a simply JavaScript snippet, which captures a list of valuable data points about the device a user is accessing your website from. Nothing fancy, the technology has been around for years in various forms, and is offered by veteran providers such as ThreatMetrix and iovation. Likewise, many other fraud prevention suites such as 41st Parameter to Sift Science have pioneered their own innovative solutions used in their broader tool sets. Device Identification can even work with reasonable effectiveness as a standalone tool in limited use cases. Account Takeover is a concern not only for merchants, but for any website with login and notions of a customer account of any sort. The ballooning threat of Account Takeover is either a past, present, or future issue for every business, touching all websites at some point in time. How you prepare for it, detect it, and defend against it makes the difference. There are three primary mechanisms (of many) which a robust Device Identification solution can prevent Account takeover:

1. Provides a platform which to discover suspicious login activity and patterns.

2. Identify anomalies in device configurations such as attempting to conceal or hide geo-location.

3. Correlates device information with account behavior to identify suspicious transactions based on changes in device type, time zone, browser type, etc.

When Device Identification and Account Takeover solutions are properly deployed they can dramatically improve the experience for good customers by eliminating unnecessary security checks. This will help to streamline the transaction process or improve conversion rates (for eCommerce Merchants).

Taking steps to protect pages such as login, checkout, or account navigation pages (if properly deployed in conjunction with proper strategy and management) goes a long way to bolstering defenses against Account Takeover. A simple Device Identification check at such portals often yields telling perspective, piercing proxies, going deeper into exposing malicious users. While device identification is commonly used as a one part of checkout centric fraud checks performed by rules engine based fraud tools (like Kount, Accertify, ReD, or Cybersource), it has broader application across websites to authenticate users.

Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Compliance 1 min read
The Tokenization, PCI and Fraud Prevention Puzzle Read More
Industry Insights 4 min read
Cyber Safety: Prevention, Protection, and Everything in Between Read More
Security Operations 2 min read
Information security for your local city, town, or village Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.