Skip to main content
Security Guide

What to Do After a Data Breach: Step-by-Step Response Guide (2026)

Your accounts were compromised. Here's exactly what to do in the first hour, first day, and first week to minimize damage and prevent future breaches.

Sarah Chen — Lead Security Editor
Sarah Chen·Lead Security Editor
Updated
3 min read

You've Been Breached. Now What?

Finding out your data was exposed in a breach is stressful, but acting quickly and methodically limits the damage. This guide walks you through exactly what to do, in order of priority.

First Hour: Stop the Bleeding

1. Identify What Was Compromised

Check the breach notification for what data was exposed:

  • Email + password — Most common. Change password immediately
  • Financial data — Contact your bank/card issuer
  • SSN / government ID — Freeze your credit (see below)
  • Phone number — Watch for SIM swap attempts
  • Address — Lower risk but enables physical threats

2. Change the Compromised Password

Go directly to the affected service (don't click links in breach notifications — they could be phishing). Change your password to a unique, strong one generated by your password manager.

3. Change That Password Everywhere Else

If you reused that password on any other service (be honest), change it everywhere. This is why password managers matter — they make this process fast instead of agonizing.

4. Enable 2FA If Not Already Active

If the breached account didn't have 2FA, enable it now. Use an authenticator app, not SMS. This prevents attackers from accessing your account even if they have your password.

First Day: Secure the Perimeter

5. Check Have I Been Pwned

Visit haveibeenpwned.com and enter your email. It shows every known breach your email appears in. You may discover breaches you didn't know about.

6. Review Account Activity

Check recent activity on the compromised account:

  • Unknown login locations or devices
  • Sent messages or emails you didn't write
  • Changed settings (forwarding rules, recovery email)
  • Connected apps you didn't authorize

Revoke any unauthorized sessions and devices.

7. Check Connected Accounts

If the breached account is used as a login for other services (e.g., "Sign in with Google"), check those services too. Revoke access from the breached account's security settings.

8. Monitor Financial Accounts

If financial data was exposed:

  • Check bank and credit card statements for unauthorized charges
  • Set up transaction alerts for all accounts
  • Contact your bank's fraud department proactively
  • Consider a credit freeze (free in the US via Equifax, Experian, TransUnion)

First Week: Harden Everything

9. Audit All Your Accounts

Use your password manager's security audit / health check feature to find:

  • Reused passwords (change them all)
  • Weak passwords (upgrade to 20+ character random strings)
  • Accounts without 2FA (enable it)

10. Update Your Recovery Information

Ensure your recovery email and phone number are current on critical accounts. If an attacker changes your recovery info, you lose the ability to regain access.

11. Review Your VPN and Network Security

A breach might have originated from network-level interception. Ensure:

  • Your VPN is active on all devices
  • Kill switch is enabled
  • You're not connected to untrusted networks

12. Document Everything

Keep records of:

  • When you discovered the breach
  • Which accounts were affected
  • What actions you took and when
  • Any unauthorized transactions

This documentation is essential if you need to file insurance claims, police reports, or dispute unauthorized charges.

Preventing Future Breaches

The best breach response is not needing one. Minimum security setup:

  1. Password manager with unique passwords for every account
  2. 2FA on all important accounts (authenticator app, not SMS)
  3. VPN to encrypt your traffic and prevent network-level attacks
  4. Have I Been Pwned monitoring — sign up for email notifications
  5. Regular audits — check your password manager's health report monthly

When to Report to Authorities

  • Identity theft: File at IdentityTheft.gov (US) or your country's equivalent
  • Financial fraud: Report to your bank, then to the FTC or local consumer protection agency
  • Workplace breach: Report to your company's IT security team immediately
  • Tax fraud: Contact your tax authority before filing season

How We Verified

Response steps based on CISA breach response guidelines, FTC identity theft recovery framework, and SANS Institute incident response methodology. All recommended tools verified April 2026.

Share:XLinkedInEmail

Related Guides

Was this guide helpful?

Advertisement

Ready to Get Protected?

Take the next step in securing your remote work setup.

Sources & Citations

  1. 1CISA: What to Do After a Breach
  2. 2FTC: IdentityTheft.gov Recovery Steps
  3. 3Have I Been Pwned — haveibeenpwned.com