You just received a notification about unusual activity on one of your accounts. Or maybe you discovered that your email address appeared in a data breach. Perhaps you noticed unauthorized transactions or login attempts you do not recognize. Whatever the sign, here are the 8 steps you should take immediately to contain the damage and protect your digital life.
Take a deep breath. A compromised account is serious, but it is manageable if you act methodically. Panicking leads to mistakes — clicking on phishing links in fake "security alert" emails, rushing through steps, or making changes that lock you out of your own accounts.
Before you do anything, verify that the alert is legitimate. If you received an email about a breach, do not click links in the email. Instead, go directly to the service's website by typing the URL in your browser. Check their official security blog or status page for confirmation.
Log into the affected account and change the password right away. Use a password generator to create a strong, unique replacement — at least 16 characters with a mix of uppercase, lowercase, numbers, and symbols. Do not create the new password based on the old one (no incrementing numbers or changing one character).
If you are locked out of the account, use the service's account recovery process immediately. The sooner you regain control, the less damage the attacker can do.
If the affected account supports two-factor authentication and you have not already enabled it, do so now. 2FA adds a second verification step (usually a 6-digit code from an authenticator app) that an attacker cannot bypass even if they have your password.
Prefer app-based TOTP (Time-based One-Time Password) over SMS-based 2FA. SMS codes can be intercepted through SIM-swapping attacks, while TOTP codes generated by an authenticator are significantly more secure.
This is the critical step that most people skip. If you used the compromised password on any other account, those accounts are now vulnerable too. Credential stuffing attacks test stolen passwords across hundreds of services automatically.
Go through your accounts and identify every service where you used the same or a similar password. Change each one to a unique, generated password. Yes, this is tedious — which is exactly why a password manager is essential for preventing this situation in the future.
MySecure#2024 and you used the same password on Gmail, your bank, and Amazon, all four accounts are now compromised. Attackers will try the stolen password on every major service within hours.A breach scan checks your passwords against databases of known leaked credentials (such as Have I Been Pwned, which contains over 12 billion compromised passwords). This tells you which of your passwords have already been exposed in previous breaches, even if you were not aware.
A password manager with a built-in breach scanner can check all your stored credentials at once and flag every compromised password. Without one, you would need to check each password individually — a process most people will never complete for 100+ accounts.
Your email account is the master key to your digital life. Attackers who gain access to your email can:
Check your email for the following signs of compromise:
If any financial accounts may have been exposed, take immediate action:
The reason most people end up in this situation is password reuse. A password manager eliminates this risk entirely by generating and storing a unique, strong password for every account. After recovering from a breach, setting up a password manager should be your top priority.
Here is how it prevents future incidents:
The UnveilPass Breach Scanner uses the Have I Been Pwned k-anonymity API to check your passwords without ever sending them in full to any external service. Here is how it works:
You can scan your entire vault with one click and immediately see which credentials need to be changed. Each compromised entry links directly to the edit view so you can generate a new password on the spot.
Check all your credentials against known breaches in one click. Zero-knowledge: your passwords never leave your browser. Free to start.
Get Started FreeDiscovering a compromised account is stressful, but following these 8 steps will help you contain the damage and prevent it from happening again. The most important takeaway: stop reusing passwords. A password manager makes this effortless by generating, storing, and monitoring unique passwords for every account you own. Set one up today, and the next breach notification becomes a minor inconvenience instead of a crisis.