You've Been Breached. Now What?
Finding out your data was exposed in a breach is stressful, but acting quickly and methodically limits the damage. This guide walks you through exactly what to do, in order of priority.
First Hour: Stop the Bleeding
1. Identify What Was Compromised
Check the breach notification for what data was exposed:
- Email + password — Most common. Change password immediately
- Financial data — Contact your bank/card issuer
- SSN / government ID — Freeze your credit (see below)
- Phone number — Watch for SIM swap attempts
- Address — Lower risk but enables physical threats
2. Change the Compromised Password
Go directly to the affected service (don't click links in breach notifications — they could be phishing). Change your password to a unique, strong one generated by your password manager.
3. Change That Password Everywhere Else
If you reused that password on any other service (be honest), change it everywhere. This is why password managers matter — they make this process fast instead of agonizing.
4. Enable 2FA If Not Already Active
If the breached account didn't have 2FA, enable it now. Use an authenticator app, not SMS. This prevents attackers from accessing your account even if they have your password.
First Day: Secure the Perimeter
5. Check Have I Been Pwned
Visit haveibeenpwned.com and enter your email. It shows every known breach your email appears in. You may discover breaches you didn't know about.
6. Review Account Activity
Check recent activity on the compromised account:
- Unknown login locations or devices
- Sent messages or emails you didn't write
- Changed settings (forwarding rules, recovery email)
- Connected apps you didn't authorize
Revoke any unauthorized sessions and devices.
7. Check Connected Accounts
If the breached account is used as a login for other services (e.g., "Sign in with Google"), check those services too. Revoke access from the breached account's security settings.
8. Monitor Financial Accounts
If financial data was exposed:
- Check bank and credit card statements for unauthorized charges
- Set up transaction alerts for all accounts
- Contact your bank's fraud department proactively
- Consider a credit freeze (free in the US via Equifax, Experian, TransUnion)
First Week: Harden Everything
9. Audit All Your Accounts
Use your password manager's security audit / health check feature to find:
- Reused passwords (change them all)
- Weak passwords (upgrade to 20+ character random strings)
- Accounts without 2FA (enable it)
10. Update Your Recovery Information
Ensure your recovery email and phone number are current on critical accounts. If an attacker changes your recovery info, you lose the ability to regain access.
11. Review Your VPN and Network Security
A breach might have originated from network-level interception. Ensure:
- Your VPN is active on all devices
- Kill switch is enabled
- You're not connected to untrusted networks
12. Document Everything
Keep records of:
- When you discovered the breach
- Which accounts were affected
- What actions you took and when
- Any unauthorized transactions
This documentation is essential if you need to file insurance claims, police reports, or dispute unauthorized charges.
Preventing Future Breaches
The best breach response is not needing one. Minimum security setup:
- Password manager with unique passwords for every account
- 2FA on all important accounts (authenticator app, not SMS)
- VPN to encrypt your traffic and prevent network-level attacks
- Have I Been Pwned monitoring — sign up for email notifications
- Regular audits — check your password manager's health report monthly
When to Report to Authorities
- Identity theft: File at IdentityTheft.gov (US) or your country's equivalent
- Financial fraud: Report to your bank, then to the FTC or local consumer protection agency
- Workplace breach: Report to your company's IT security team immediately
- Tax fraud: Contact your tax authority before filing season
How We Verified
Response steps based on CISA breach response guidelines, FTC identity theft recovery framework, and SANS Institute incident response methodology. All recommended tools verified April 2026.
Related Guides
10 Secure Browsing Habits Every Remote Worker Should Build (2026)
Simple daily habits that dramatically reduce your risk. HTTPS checking, URL verification, download safety, and more.
Sarah ChenSecure Job Searching: Protect Your Privacy While Looking for Work (2026)
Job searching exposes your personal data to recruiters, job boards, and potential scammers. How to search safely while protecting your identity.
Sarah ChenVPN for Accountants & CPAs: Protect Financial Client Data (2026)
Accountants handle the most sensitive financial data. VPN setup for tax season security, client portal access, and IRS compliance.
Sarah ChenWas this guide helpful?
Advertisement
Ready to Get Protected?
Take the next step in securing your remote work setup.
Sources & Citations
- 1CISA: What to Do After a Breach
- 2FTC: IdentityTheft.gov Recovery Steps
- 3Have I Been Pwned — haveibeenpwned.com