{"id":14898,"date":"2024-08-02T13:38:49","date_gmt":"2024-08-02T13:38:49","guid":{"rendered":"https:\/\/trustpair.com\/blog\/prevent-account-takeover-from-happening-in-your-business\/"},"modified":"2025-07-15T13:33:52","modified_gmt":"2025-07-15T13:33:52","slug":"prevent-account-takeover-from-happening-in-your-business","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/","title":{"rendered":"Prevent account takeover from happening in your business"},"content":{"rendered":"<p>In January 2022, <a href=\"https:\/\/www.zdnet.com\/article\/shell-forced-re-route-oil-supplies-after-cyberattack-on-german-companies\/\">BlackCat ransomware group<\/a> launched an attack on the German gas network \u2013Marquard &amp; Bahls\u2013 via the takeover of their Microsoft Exchange systems. Exploiting the third-party provider, the cybercriminals gained access to Marquard &amp; Bahls business secrets and intellectual property, as well as potential customer data. <strong>Account takeover fraud is one of the biggest threats to organizations<\/strong>, and it\u2019s difficult to fully protect against. In this piece, you\u2019ll learn about how to detect and prevent an attack, as well as block the financial effects of account takeover with Trustpair\u2019s platform. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Request a demo to learn more!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-node hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5\"><img decoding=\"async\" id=\"hs-cta-img-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5.png\" alt=\"Nouveau call-to-action\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'f87ea066-7298-4ae0-bcd1-f309efec12d5', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>What is account takeover?<\/h2>\n<p>Account takeover (ATO) happens when <strong>cybercriminals gain access to a person\u2019s account credentials<\/strong>. Typically, this data is gained through a social engineering attack like <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-7-ways-to-recognize-phishing-and-avoid-it\/\">phishing,<\/a> through a data breach, or hard hack like a malware attack. The victim might not know that their data has been made available to criminals and therefore doesn\u2019t change their password to protect the security of their accounts.<\/p>\n<p>Once gained, these credentials are typically sold online on the black market. The new purchaser can use the individuals&#8217; credentials to impersonate them online, takeover their business accounts and defraud companies as they impersonate victims. They might even change the passwords to lock out the original owner.<\/p>\n<p>In some cases, the fraudster will deploy bots to trial these login details across as many websites as they can \u2013 from social media to e-commerce sites, finance accounts and more. In other cases, the information is sold as attached to particular accounts.<\/p>\n<h2>What is its impact on business?<\/h2>\n<p>Typical account takeover vulnerability affects the customer, but businesses also stand to lose when their accounts are accessed by bad actors.<\/p>\n<h3>Malware or ransomware<\/h3>\n<p><strong>Malware and ransomware attacks can arise as a result of account takeover.<\/strong> In a real-life case seen at <a href=\"https:\/\/perception-point.io\/blog\/account-takeover-protection-a-real-example\/\">Perception Point<\/a>, the email account of a known business associate was commanded by fraudsters. The cybercriminals choose business email compromise to scam a partner:<\/p>\n<blockquote><p>Hi [name],<\/p>\n<p>Here is the form you asked for: [malware link].<\/p>\n<p>Thanks,<br \/>\n[account holder name]<\/p><\/blockquote>\n<p>By using a google form link to disguise the malware, they\u2019ll likely overcome any suspicions of the recipient. Moreover, since the original account holder is a trusted business partner, there is really no reason to question the interaction.<\/p>\n<p>If the recipient clicks on the link, they\u2019ll instantly download malware onto their computer, or worse, the entire network. This could enable the perpetrators to lock you out of the system and demand a ransom payment in exchange to unlock everything. Or, it could grant them access to snoop around, view and steal your data, and even send themselves payments from your company accounts.<\/p>\n<h3>Lateral attacks<\/h3>\n<p>Lateral attacks are <strong>secondary attacks on departments, systems and employees other than the primary target.<\/strong> Sometimes attackers will choose to take their chances, and other times, this secondary target was the plan all along.<\/p>\n<p>For example, <a href=\"https:\/\/www.vice.com\/en\/article\/7kvkqb\/how-ea-games-was-hacked-slack\">EA Games became the ultimate victim of an attack in 2021<\/a>, but they weren\u2019t the first target. Instead, the hackers bought stolen cookies\u2013 the small data files that contain website and user info\u2013 for a range of other websites.<\/p>\n<p>From there, the perpetrators launched a lateral attack by using social engineering techniques on a member of EA Games\u2019 IT staff. This strategy aimed to convince the IT team to manually approve access when multi-factor authentication failed. It meant the attackers got access to a slack account, where they were able to view the source code for games like FIFA and Battlefield.<\/p>\n<h3>Financial loss<\/h3>\n<p>When cybercriminals gain access to important accounts, <strong>they can make purchases, take out loans, and even transfer funds to themselves.<\/strong> Once a customer realizes, they\u2019ll rely on the institution to refund the money.<\/p>\n<p>From a business perspective, it\u2019s not really fair, but in most cases, businesses choose to reimburse customers to avoid the reputational fallout that could follow. It\u2019s typically impossible for these institutions to recover the funds from fraudsters themselves, leading to significant financial losses.<\/p>\n<p>OCBC \u2013 a bank in Singapore \u2013 has had to compensate more than 470 customers after a relentless phishing campaign in 2021. Fraudsters targeted the bank\u2019s customers over the holiday period, and were able to take over their accounts and send payments to \u201cmule\u201d bank accounts.<\/p>\n<p>The bank said that as soon as one mule account was discovered and taken down, another would pop up in its place. The campaign caused the bank to pay more than $8.5 million out of goodwill to each of the customers that lost money.<\/p>\n<h2>What are the main methods for account takeover?<\/h2>\n<p>While account takeover is the ultimate destination, there are many different ways that attackers attempt to reach it, including:<\/p>\n<ol>\n<li>Data breaches<\/li>\n<li>Brute force attacks<\/li>\n<li>Phishing<\/li>\n<\/ol>\n<h3>Data breaches<\/h3>\n<p>Data breaches are often<strong> the fault of an internal employee or system,<\/strong> rather than a targeted attack from fraudsters. They\u2019re opportunistic ways to take over an account, because fraudsters typically realize there\u2019s been a data breach, and then launch their attack.<\/p>\n<p>An anonymous Human Resources platform suffered from a data breach in 2024, resulting in password changes, payroll fraud, and full on identity theft. It happened because an employee decided to take a shortcut, downloading an illegal version of a paid software to save money.<\/p>\n<p>Unknown to the employee, this software was actually filled with malware designed to steal information through <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-dangers-of-cyber-fraud-for-your-company\/\">cyber fraud<\/a>. Once it was on the victim\u2019s computer, it could easily view and steal account credentials by recording keystrokes. After that, the information was sold on the dark web to the highest bidder.<\/p>\n<p>The data breach eventually resulted in cloned accounts, further social engineering attacks and password changes, locking real employees out of their accounts. In the end, the human resources platform faced legal repercussions, because it was linked to a bank that could cause wider financial instability.<\/p>\n<h3>Brute force attacks<\/h3>\n<p>Brute force attacks are more intentional, because <strong>they use bots to target specific accounts<\/strong>. Here, hackers use online programs to trial and error tons of credential combinations. Thanks to the extensive resources needed to perform these types of account takeover attacks, the targets are typically high-value accounts.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/gb\/security\/news\/cyber-attacks\/2012-linkedin-breach-117-million-emails-and-passwords-stolen-not-6-5m\">LinkedIn faced a brute-force attack in 2012<\/a>, when attackers leveraged its weak cryptographic controls. Approximately 6.5 million account passwords were leaked, and the accounts taken over, due to this type of automated guess campaign.<\/p>\n<h3>Phishing<\/h3>\n<p>Phishing (or spear phishing if it\u2019s highly targeted) is a different method of account hijacking derived from social engineering and manipulation. <strong>The attackers convince the victim to willingly give their account credentials, usually by pretending to be someone else.<\/strong><\/p>\n<p>See examples of spear phishing in <a href=\"https:\/\/trustpair.com\/gb\/blog\/4-examples-of-spear-phishing-attacks\/\">this article!<\/a><\/p>\n<p>Thanks to this methodology, victims typically realize they\u2019ve been conned and the attackers only have a small window of opportunity to take over the account.<\/p>\n<p>Sony fell victim to a spear phishing scam in 2014, when cyber attackers sent deceptive emails to a portion of employees. Once they gave over their login and password credentials, the group leaked five movies to the internet, and threatened the company over the release of a new movie based around North Korea.<\/p>\n<h2>How to detect account takeover?<\/h2>\n<p><strong>Detecting account takeover is difficult,<\/strong> especially if the fraudsters have bypassed multi-factor authentication. Oftentimes, companies aren\u2019t monitoring the actions of their employees, so wouldn\u2019t be able to flag suspicious behavior.<\/p>\n<h3>Unusual account activity<\/h3>\n<p>Account activity monitoring uses <strong>automated tools to track and measure user behavior.<\/strong><\/p>\n<p>For example, <a href=\"https:\/\/trustpair.com\/gb\/blog\/maintain-your-vendor-database-to-avoid-payment-fraud\/\">Trustpair\u2019s vendor data management tool<\/a> verifies that new bank account details are legitimate when third party vendors change their details. The monitoring tool checks against global databases in real-time, and blocks outgoing transactions to suspicious accounts.<\/p>\n<p>Other information to track and monitor includes:<\/p>\n<ul>\n<li>Unfamiliar device logins: does the user typically login through their phone, and suddenly is using a laptop?<\/li>\n<li>Unusual location: does the user reside in the USA, but is logging in from Spain?<\/li>\n<li>Password reset requests: has the user requested a high number of password resets in a short space of time?<\/li>\n<\/ul>\n<p>By tracking these factors, you\u2019ll set a \u2018normal\u2019 for the users behavior. Then, when opposing behavior is displayed, you\u2019re more likely to detect account takeovers and prevent the consequences before the fraudsters are successful.<\/p>\n<h3>Multi-factor authentication<\/h3>\n<p>If you notice some unusual account activity, it\u2019s worth <strong>testing the user to completely verify their identity<\/strong> as a form of <a href=\"https:\/\/trustpair.com\/gb\/blog\/5-ways-due-diligence-can-prevent-fraud-in-your-international-contracts\/\">due diligence<\/a>. Multi-factor authentication, or two-factor authentication (2FA) relies on validating at least two of the following three variables;<\/p>\n<ol>\n<li>Knowledge: passwords or passcodes<\/li>\n<li>Inherence: face ID or fingerprint<\/li>\n<li>Possession: code sent to phone or email verification link<\/li>\n<\/ol>\n<p>When users can\u2019t pass their 2FA, your business should be raising the red flags. Watch out for manual attempts to bypass this measure, such as emails to your IT, HR and customer departments, as these could be signs of social engineering.<\/p>\n<p>Multi-factor authentication is mandated in certain regulations, like in <a href=\"https:\/\/trustpair.com\/gb\/blog\/psd2-does-it-apply-to-your-business\/\">PSD2<\/a> for financial institutions. But even if it\u2019s not enforced in your industry, it is best practice and can help detect and prevent fraudulent activity like phishing, smishing (sms phishing) or vishing (voice phishing).<\/p>\n<h2>How to prevent account takeover from happening?<\/h2>\n<p>Account takeover protection and prevention is <strong>not a one-size fits all approach<\/strong>, especially as fraudsters iterate their strategies with new techniques and technologies. Here are some suggestions:<\/p>\n<h3>Strong password policies<\/h3>\n<p>Strong password policies make it <strong>harder for brute force attacks to be successful<\/strong>. They ensure that users don\u2019t:<\/p>\n<ul>\n<li>choose passwords that they\u2019ve used before<\/li>\n<li>use standard words or phrases<\/li>\n<li>Only use letters (requiring numbers and symbols too)<\/li>\n<\/ul>\n<p>Strong password policies are not just policies. Companies can use online programs that force customers and employees to opt out of \u201cguessable\u201d passwords. Most of the time, account holders will use a platform that comes up with a random password on their behalf, which is then saved into an online vault.<\/p>\n<p>It helps to protect against account takeover since the users don\u2019t even know their passwords themselves!<\/p>\n<h3>Upgraded anti-spam measures<\/h3>\n<p>One example of an anti-spam measure is an <strong>upgraded email filtering service<\/strong>. This checks the domain name, history of \u2018junk\u2019 labeling associated with the sender, and verifies the contents of an email to make sure there\u2019s no malware links.<\/p>\n<p>A DMARC checker is another useful tool. It is an automated program that controls the delivery of emails \u2013identifying threats like spoofing.<\/p>\n<p>By upgrading anti-spam measures, you\u2019re not relying on the manual identification of account takeover by employees or customers, who may miss the signs. Instead, you\u2019re automating the prevention of account takeover fraud by employing tools that work round the clock to protect the accounts.<\/p>\n<h3>Employee training against social manipulation<\/h3>\n<p>Employee training sessions are a <strong>useful way of educating your staff about the risks, signs and consequences of account takeover.<\/strong> With regular training, colleagues will find it easier to become suspicious when things aren\u2019t normal, and know their next steps.<\/p>\n<p>Trustpair\u2019s recent research into the fraud trends of 2024 highlighted that 94% of companies were targeted more than once by cyber fraudsters. So you can bet that at least one of your employees is likely to come up against the threat; and the more training, the better.<\/p>\n<h3>Payment fraud prevention software<\/h3>\n<p>If all else fails and fraudsters are able to access and take over accounts, you can still protect your finances. Platforms like Trustpair will automatically block outgoing transactions to suspicious accounts where the data given to you by third parties doesn\u2019t match global records.<\/p>\n<p>Our <a href=\"https:\/\/trustpair.com\/gb\/fraud-prevention-software\/\">fraud prevention software<\/a> provides real time validation to eliminate manual errors and ensure you get alerted to anomalies as soon as they occur. This way, even if cybercriminals get into the accounts, your funds are protected.<\/p>\n<p><a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Get your hands on a Trustpair demo here to learn more.<\/a><\/p>\n<h3>To conclude: Reviewing account takeover best practices<\/h3>\n<p>Account takeover fraud happens when criminals get into a person&#8217;s account, typically through data breaches, brute force attacks and social manipulation. Detect account takeover through monitoring account activity and using 2FA. Prevent account takeover through upgraded anti-spam, employee training, and Trustpair\u2019s payment protection platform.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In January 2022, BlackCat ransomware group launched an attack on the German gas network \u2013Marquard &amp; Bahls\u2013 via the takeover of their Microsoft Exchange systems. Exploiting the third-party provider, the cybercriminals gained access to Marquard &amp; Bahls business secrets and intellectual property, as well as potential customer data. Account takeover fraud is one of the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14899,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-14898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Account takeover: protect your business against it - Trustpair<\/title>\n<meta name=\"description\" content=\"Account takeover can happen to businesses and individuals alike. Learn all about it and how you can safeguard against it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Account takeover: protect your business against it - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Account takeover can happen to businesses and individuals alike. Learn all about it and how you can safeguard against it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-15T13:33:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Prevent account takeover from happening in your business\",\"datePublished\":\"2024-08-02T13:38:49+00:00\",\"dateModified\":\"2025-07-15T13:33:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/\"},\"wordCount\":2018,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/\",\"name\":\"Account takeover: protect your business against it - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg\",\"datePublished\":\"2024-08-02T13:38:49+00:00\",\"dateModified\":\"2025-07-15T13:33:52+00:00\",\"description\":\"Account takeover can happen to businesses and individuals alike. Learn all about it and how you can safeguard against it.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prevent account takeover from happening in your business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Account takeover: protect your business against it - Trustpair","description":"Account takeover can happen to businesses and individuals alike. Learn all about it and how you can safeguard against it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/","og_locale":"en_GB","og_type":"article","og_title":"Account takeover: protect your business against it - Trustpair","og_description":"Account takeover can happen to businesses and individuals alike. Learn all about it and how you can safeguard against it.","og_url":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:49+00:00","article_modified_time":"2025-07-15T13:33:52+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Prevent account takeover from happening in your business","datePublished":"2024-08-02T13:38:49+00:00","dateModified":"2025-07-15T13:33:52+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/"},"wordCount":2018,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/","url":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/","name":"Account takeover: protect your business against it - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg","datePublished":"2024-08-02T13:38:49+00:00","dateModified":"2025-07-15T13:33:52+00:00","description":"Account takeover can happen to businesses and individuals alike. Learn all about it and how you can safeguard against it.","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2255342153.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/prevent-account-takeover-from-happening-in-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"Prevent account takeover from happening in your business"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=14898"}],"version-history":[{"count":4,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14898\/revisions"}],"predecessor-version":[{"id":20163,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14898\/revisions\/20163"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/14899"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=14898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=14898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=14898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}