Data Breach? Here’s What to Do Immediately to Protect Yourself (Step-by-Step)

Discovering that your personal information was part of a data breach can be stressful—but don’t panic. There are concrete steps you can take right now to secure your accounts, prevent identity theft, and protect your data from further exposure.

Data Breach? Here’s What to Do Immediately to Protect Yourself (Step-by-Step)
Photo by Timothy Dykes / Unsplash
audio-thumbnail
Podcast: Episode 1. Your data was breached - here's how to protect yourself now
0:00
/851.32

In today’s digital world, data breaches are an all-too-common threat, affecting millions of people each year. The personal and financial information we share online is a frequent target for cybercriminals, putting your privacy at risk. If you’ve been notified or suspect that your data was compromised, it’s crucial to act fast to prevent further harm, including identity theft.

Change your passwords, enable two-factor authentication, monitor your financial accounts, and consider freezing your credit. Stay vigilant for phishing scams and take advantage of any services offered by affected companies, such as credit monitoring or identity theft protection.

This guide provides a step-by-step approach to securing your information, managing the aftermath, and protecting yourself in the future.

What Is a Data Breach and Why You Should Act Fast

A data breach occurs when unauthorized individuals gain access to sensitive information. This can include names, email addresses, passwords, Social Security numbers, credit card details, medical records, or other personal data. Cybercriminals often sell this information on the dark web or use it to commit identity theft, financial fraud, and other malicious activities.

One of the most significant breaches in recent years was the Equifax breach in 2017, where over 147 million Americans had sensitive information like Social Security numbers, birthdates, and addresses exposed.

Similarly, in 2018, Facebook suffered a breach affecting 50 million users, exposing their profiles to hackers.

When your data is compromised, your first priority should be damage control. Below are the essential steps you should take to protect yourself.

Think Your Data Was Exposed in a Breach? Here’s What to Do Next

First, Stay Calm

person sitting on rock formation during daytime
Photo by eniko kis / Unsplash

Finding out that your data might have been compromised can definitely be nerve-wracking, but it's important to stay calm and focus on the steps you need to take next.

Unfortunately, you're not alone in this experience—data breaches are more common than we’d like. In the first half of 2024 alone, over 1,500 data breaches impacted more than a billion people worldwide.

Major breaches, such as the 2017 Equifax breach, exposed the personal data of over 147 million individuals, including Social Security numbers and other sensitive information.

Similarly, the Facebook breach in 2019 affected over 533 million people, leaking details like phone numbers and email addresses.

While the situation is serious, there’s no need to panic. By following some well-established guidelines, you can manage the situation and minimize any potential damage.

1: Confirm Whether Your Data Was Involved in the Breach

The first thing you need to do is confirm if your data was part of the breach. Sometimes companies will notify you directly via email, but these notifications can be delayed.

To confirm the breach:

  1. Check Official Sources: Visit the company’s website or check news reports to see if they’ve acknowledged the breach. Most companies will issue statements when a breach occurs.
  2. Use Breach-Checking Tools: Websites like Have I Been Pwned allow you to search for your email address or phone number to see if it’s been exposed. You can also sign up for alerts in case your data is compromised in the future."

Get a free data breach scan with our AI Privacy Assistant 🔐🤖

IdentityTheft.gov
Report identity theft and get a recovery plan

2. Identify the Type of Data Compromised

Once you’ve confirmed that your data was part of a breach, the next step is understanding what kind of information was exposed. The risks vary depending on the type of data, so it's important to take note of what was compromised:

  • Email Addresses and Passwords: Attackers can use these to try logging in to other platforms where you may have reused passwords.
  • Financial Information: If your credit card or banking details were exposed, fraudsters could make unauthorized purchases or withdrawals.
  • Personally Identifiable Information (PII): Social Security numbers, addresses, or birthdates are often targeted for identity theft.
  • Medical Records: If your health data was leaked, it could be exploited for insurance fraud or other criminal activities.

Action Step:

Determine what type of data was compromised to assess the risk level. This will guide the actions you need to take to protect yourself, such as changing passwords, monitoring financial accounts, or freezing your credit.

Need personalized advice? Ask Our AI Privacy Assistant for Help 🔐🤖

AI Privacy Assistant
24/7 Personal Data Protection Get instant alerts and AI-driven guidance—24/7 protection for your personal data, so you can browse worry-free Protect Me Now Worried Hackers Are Monkeying Around with Your Data? Our AI-powered Privacy Assistant swings into action around the clock, so you don’t have to

3. Change Your Passwords Right Away

If your email, username, or password was compromised in a breach, the most urgent thing you can do is change your passwords. Follow these best practices to strengthen your security:

  • Use Strong, Unique Passwords: Create passwords that are long and complex, mixing upper and lowercase letters, numbers, and symbols. Avoid easy-to-guess info like birthdays, names, or common phrases.
  • Don’t Reuse Passwords: Each account should have its own unique password. This ensures that if one account is compromised, the others remain safe.
  • Use a Password Manager: Tools like 1Password or LastPass can help you create strong passwords and store them securely. They also make it easier to update passwords across multiple sites after a breach.

Action Step:

Immediately update the passwords for any accounts affected by the breach. Also, update passwords for any other accounts where you might have used the same one.

If you need help with creating strong passwords or setting up a password manager, don't hesitate to ask our AI Privacy Assistant for guidance! 🔒🤖

4. Enable Two-Factor Authentication (2FA)

Two-factor authentication (2FA) adds an extra layer of security to your accounts by requiring a second piece of information (usually a temporary code sent to your phone or email) in addition to your password. This helps prevent unauthorised access, even if your password was compromised.

Most major platforms—such as Google, Apple, Facebook, and banking apps—offer 2FA. Always enable this feature for your most important accounts, including email, banking, and social media.

Types of Two-Factor Authentication:

  • SMS-Based 2FA: A verification code is sent to your phone via SMS. While this method adds a layer of protection, it’s still vulnerable to SIM-swapping attacks—a method where criminals can hijack your phone number by tricking the carrier.
  • App-Based 2FA: Authentication apps like Google Authenticator or Authy generate time-based one-time codes. This method is more secure than SMS-based 2FA.
  • Hardware Tokens: Devices like YubiKey offer the highest level of security by requiring a physical device to authenticate logins.

If you’re not using 2FA yet, start today—it’s one of the best defences against unauthorised access!

Action Step:

Enable 2FA on your most sensitive accounts and, where possible, use an app-based or hardware method over SMS.

5. Monitor Your Financial Accounts

If financial information was part of the breach, monitor your bank accounts, credit card statements, and any online payment services for unusual or unauthorized transactions. Many institutions allow you to set up notifications for any transactions over a certain amount, which can help you detect fraud more quickly.

Steps to Take:

  • Set Up Alerts: Many banks offer transaction alerts via email or SMS. Enable these to receive real-time updates on your account activity.
  • Review Statements: Regularly check your statements for any unfamiliar or suspicious charges.
  • Dispute Unauthorized Transactions: If you spot any fraudulent activity, contact your bank or credit card company immediately to dispute the charges.

Action Step:

Keep a close eye on your financial accounts and report any suspicious activity immediately. Consider setting up transaction alerts to help catch unauthorized transactions early.

6. Freeze Your Credit and Set Up Fraud Alerts

If your Social Security number or other personally identifiable information (PII) was exposed, consider freezing your credit to prevent cybercriminals from opening new accounts or taking out loans in your name. A credit freeze restricts access to your credit report, making it harder for thieves to use your information for fraudulent purposes.

In addition to a credit freeze, you can set up fraud alerts with the credit bureaus. A fraud alert notifies creditors to take extra steps to verify your identity before opening any new accounts. This additional layer of security can be useful if you’re concerned about identity theft but aren’t ready to fully freeze your credit.

When Should You Use These Free Protection Tools?

Both fraud alerts and credit freezes offer important protection against identity theft, but they serve slightly different purposes depending on your situation.

When to Use a Fraud Alert:

  • You suspect fraud or identity theft, or your personal information has been exposed in a breach. A fraud alert will notify lenders to take extra steps to verify your identity before opening new credit accounts.
  • You’ve lost important personal documents, like your wallet or identification, which may expose you to identity theft risks.
  • You’re worried about potential breaches and want an added layer of security. Fraud alerts last for one year and are free to renew, offering ongoing protection with minimal disruption to your daily life.
  • You need ongoing access to credit. Unlike credit freezes, fraud alerts do not block you from applying for new credit. This makes them ideal if you still need flexibility with your credit while staying protected from fraud.

When to Use a Credit Freeze:

  • You’ve been a victim of identity theft. A freeze locks down your credit, preventing lenders from accessing your credit report and stopping thieves from opening new accounts in your name.
  • You want maximum protection. Freezing your credit at all three major bureaus (Experian, Equifax, TransUnion) is the most effective way to stop unauthorized access to your credit report.
  • You don’t plan to apply for new credit in the near future. Since a credit freeze prevents any new credit accounts from being opened, it’s best used when you don’t need immediate access to new lines of credit.
  • You’re looking for long-term security. A credit freeze lasts until you decide to unfreeze it, providing ongoing protection with no time limit.

Both tools are free and offer powerful ways to protect your credit and personal information. While fraud alerts provide flexibility and ease of use, credit freezes offer stronger, long-term protection for those who need it. Understanding your personal risk and needs will help you decide which tool to use.

How to Freeze Your Credit and Set Up Fraud Alerts:

  • You can freeze your credit for free by contacting the three major credit bureaus: EquifaxExperian, and TransUnion. You’ll need to freeze your credit with each bureau individually. If you need to apply for credit (e.g., a mortgage or car loan), you’ll have to temporarily lift the freeze.
  • To set up fraud alerts, simply contact one of the three bureaus, and they will notify the other two. Fraud alerts last for one year, but you can also request an extended fraud alert if you are a victim of identity theft, which lasts for seven years.

A credit freeze is one of the most effective ways to protect your financial identity, while a fraud alert can be a great option if you need to allow access to your credit but still want an added layer of protection.

Action Step:

If sensitive PII was exposed, take the following steps:

  • Freeze your credit with Equifax, Experian, and TransUnion to prevent identity theft.
  • Set up a fraud alert for additional protection without fully freezing your credit.

Freeze or Unfreeze Your Credit File for Free - Experian
A security freeze, often known as a credit freeze, will limit access to your Experian credit report. Here’s how to freeze and unfreeze your Experian credit report for free.
Security Freeze | Freeze or Unfreeze Your Credit | Equifax®
Learn how to apply, lift, or remove a credit freeze on your Equifax Credit Report.

7. Monitor Your Credit Report

In addition to freezing your credit, regularly monitor your credit report for signs of fraudulent activity. Regular monitoring helps you catch suspicious activity before it spirals into full-blown identity theft.

By law, you are entitled to one free credit report from each of the three major credit bureaus every year. Space out these requests throughout the year to keep an eye on your credit year-round.

Look out for accounts you don’t recognize, unexplained credit inquiries, and changes to your credit limits or balances

You can request these reports from AnnualCreditReport.com.

Some services, such as Experian, offer paid credit monitoring services that alert you to any changes in your credit report.

Also check out NerdWallet, as another great free option for monitoring your credit.

Action Step:

  1. Request your Free Credit Reports: Take advantage of your free credit report entitlement by requesting reports from all three major bureaus (Equifax, Experian, TransUnion) through AnnualCreditReport.com.
  2. Review for Suspicious Activity: Look for any unfamiliar accounts, inquiries, or unusual changes in your credit report. Pay special attention to new accounts or hard inquiries you didn’t authorize.
  3. Dispute Fraudulent Information: If you notice anything suspicious, immediately file a dispute with the credit bureau and the creditor to correct any inaccuracies or prevent identity theft.
  4. Set Up Alerts: Many credit monitoring services offer alerts when significant changes occur in your credit file. Consider using these services to keep a close eye on your credit throughout the year.

8. Watch for Phishing Scams

After a breach, be on high alert for phishing scams. Cybercriminals often use the chaos following a breach to send phishing emails that appear to come from legitimate companies, tricking you into providing more personal information or downloading malware.

Tips for Avoiding Phishing Scams:

  • Verify the Sender: Be cautious of emails claiming to be from the breached company, especially those asking for personal information or urging immediate action.
  • Don’t Click Links: Avoid clicking on links or downloading attachments from unsolicited emails. Instead, visit the company's official website directly by typing the URL into your browser.
  • Check for Signs of Fraud: Look for spelling mistakes, suspicious email addresses, and urgent language—all common signs of phishing attempts.

Action Step:

Stay vigilant and double-check before clicking! Always verify the authenticity of emails by inspecting the sender's address, looking for unusual language or requests, and avoiding unsolicited links or attachments. When in doubt, manually type the company's official website into your browser rather than relying on embedded links

9. Use Dark Web Monitoring Services

If you’re concerned that your data might be circulating on the dark web, consider using dark web monitoring services to scan for your information.

Many services, including credit monitoring agencies and security companies, offer dark web scans to check if your Social Security number, email address, or other sensitive data has been exposed.

💡If possible only share email address and phone number with these services. Why? Google <name of dark web scanning company> + "data breach". 😞Action Step:

Why Our Dark Web Monitoring Is Different

Most dark web monitoring services ask for a wealth of personal and financial information—think Social Security numbers, credit card details, or even home addresses. But sharing that kind of data can make you more vulnerable. Here’s how we approach things differently:

  • Minimal Exposure: With our service, we only ask for your email or phone number—the bare minimum needed to keep you safe. By limiting what you share, you avoid risking exposure of sensitive details like your Social Security number or credit card information. Ironically, some of the biggest dark web monitoring services have faced their own data breaches. Why give them more information than necessary?
  • Email and Phone as Key Identifiers: These are the most common data points used in breaches and are perfect for monitoring without compromising privacy. Since most of the data floating around the dark web revolves around emails and phone numbers, they provide the most effective coverage while maintaining your privacy.
  • Proven Protection: By focusing on email and phone number monitoring, we detect the majority of potential threats, offering robust protection without asking for sensitive financial or personal data. You get peace of mind and comprehensive protection with less exposure.

10. Contact Affected Companies

In the event of a breach, affected companies typically offer remediation steps, which can include free credit monitoring services, identity theft protection, or advice on securing your accounts. Follow their instructions carefully and take advantage of any offered services.

💡While you should take advantage of all offered services, aim to only share your basic information (email and phone number) with them. Why? Google <name of identity theft protection company> + "data breach". 😞

In some cases, breached companies may provide compensation or settlement claims. Keep an eye out for class-action lawsuits or settlements related to the breach, as you may be eligible for financial compensation or identity theft protection services.

Action Step:

Follow the instructions from the breached company carefully and take full advantage of any services they offer, such as identity theft protection or credit monitoring.

Be sure to keep records of any communications and actions taken. In some cases, you might be eligible for compensation through class-action lawsuits or settlements

11. Report Identity Theft

Dealing with identity theft can feel stressful, but taking the right steps immediately can make a huge difference in minimizing damage. Here’s how to act:

  • Contact the Affected Institution: Notify any organizations (banks, credit card companies, etc.) where fraudulent activity has taken place. They may help you stop or reverse transactions and safeguard your accounts.
  • File an Identity Theft Report: Report the theft to the Federal Trade Commission (FTC) at IdentityTheft.gov. They’ll help you create a recovery plan, including how to prevent further misuse of your identity.
  • File a Police Report: In some cases, you might need to file a police report, especially if significant monetary loss is involved. Having this documentation can be essential for legal processes or disputing fraudulent transactions.

Action Step:

If you suspect identity theft, don't delay—file a report with the FTC immediately and follow the provided recovery plan to restore your identity.

Take the necessary steps to notify institutions and, if needed, involve law enforcement to protect your financial well-being.

12. Plan for Future Protection

While it’s impossible to prevent every data breach, there are steps you can take to protect yourself going forward:

  • Keep Software Up to Date: Regularly update your devices and apps to protect against known vulnerabilities.
  • Use a VPN: When browsing on public Wi-Fi, use a virtual private network (VPN) to protect your data from being intercepted by hackers.
  • Educate Yourself on Cybersecurity: Stay informed about best practices for online security and privacy. Awareness is one of the best defenses against future breaches.

Action Step:

To safeguard your personal data going forward, adopt these key practices:

  • Regularly update your software and apps to stay protected against known vulnerabilities.
  • Use a VPN for secure internet browsing, especially on public Wi-Fi networks.
  • Stay informed by educating yourself on cybersecurity best practices to be better prepared for emerging threats.

Annual Credit Report.com - Home Page
ACR Home Page
Cash App’s Data Leak: We Lost Your Info, But You Could Cash In!
A settlement has been reached due to a data breach involving Cash App Investing, LLC, which exposed customer information. Those affected can file a claim for compensation.

Try our AI Privacy Advisor for free.

Ask it anything!

Try it now

Conclusion

Discovering that your data has been involved in a breach can be alarming, but taking immediate action can significantly reduce the impact on your financial and personal security.

By Changing your passwords, enabling two-factor authentication, monitoring your financial accounts, and freezing your credit if necessary, you can secure your information from further damage. 

Stay vigilant for phishing scams and always take advantage of any credit monitoring or identity theft protection services offered by the affected companies.

Following these steps and adopting good cybersecurity habits—like regularly updating your software and staying informed about online threats—will help you safeguard your data and reduce the risk of future breaches.