How to Protect Your Email After a Data Breach
Data breaches have become alarmingly common. In 2024 alone, over 3,000 publicly disclosed breaches exposed billions of email addresses and passwords. If you've received a notification that your email was part of a breach—or suspect it might have been—taking immediate action is crucial to protecting your digital identity.
This guide walks you through exactly what to do when your email is compromised, from immediate response to long-term protection strategies.
Signs Your Email Was Part of a Data Breach
Before we dive into solutions, let's identify the warning signs:
Obvious Indicators
- Breach notification from a service you use
- Email from Have I Been Pwned or similar monitoring services
- Suspicious login attempts notifications from Gmail
- Password reset emails you didn't request
- Locked out of accounts due to changed passwords
Subtle Warning Signs
- Sudden increase in spam emails
- Unknown subscriptions to newsletters you didn't sign up for
- Friends receiving spam from your address
- Emails in Sent folder you didn't send
- New filters or forwarding rules you didn't create
If you notice any of these signs, assume your email has been compromised and act immediately.
Immediate Steps: First 24 Hours
Time is critical when your email has been breached. Follow these steps in order:
1. Change Your Password Immediately
Do this before anything else:
- Go to your email provider's password change page
- Choose a strong, unique password:
- At least 16 characters
- Mix of uppercase, lowercase, numbers, symbols
- No dictionary words
- No personal information
- Nothing you've used before
Password manager recommended: Use 1Password, Bitwarden, or Dashlane to generate and store complex passwords.
Bad password examples:
Password123!JohnSmith2025ILovePizza!
Good password example:
kR9#mQ2$nB5@wL8&pT3
2. Enable Two-Factor Authentication (2FA)
2FA adds a critical second layer of security. Even if someone has your password, they can't access your account without the second factor.
For Gmail:
- Go to myaccount.google.com
- Click "Security"
- Select "2-Step Verification"
- Choose your method (authenticator app recommended over SMS)
Best 2FA methods (in order):
- Authenticator apps (Google Authenticator, Authy, Microsoft Authenticator)
- Hardware keys (YubiKey, Google Titan)
- SMS codes (better than nothing, but vulnerable to SIM swapping)
Never use:
- Email as your 2FA method (circular vulnerability)
- Easily guessed security questions
3. Review Account Activity
Check what the attacker might have accessed or changed:
In Gmail:
Click gear icon → "See all settings"
Review each tab:
- Filters: Look for unknown forwarding rules
- Forwarding: Check for unauthorized forwarding addresses
- Delegation: Verify no unknown users have access
- Labels: Look for suspicious organization
Check "Last account activity" at bottom of inbox
- Review recent access locations
- Note any suspicious IP addresses or locations
4. Revoke Suspicious Access
Review connected apps:
- Go to myaccount.google.com/permissions
- Review all apps with email access
- Remove anything you don't recognize or no longer use
Why this matters: Changing your password doesn't revoke access to apps that already have permission.
5. Scan for Malware
If your email was compromised, your device might be infected:
- Run a full system scan with updated antivirus software
- Check browser extensions for suspicious additions
- Review recently installed applications
- Clear browser cache and cookies
Longer-Term Protection: Securing Your Future
Once immediate threats are addressed, implement these strategies for lasting security:
Use Email Aliases for Better Protection
This is one of the most powerful long-term strategies against data breaches.
What Are Email Aliases?
Email aliases let you create multiple email addresses that all forward to your main inbox. When a service gets breached, only that specific alias is compromised—not your main email address.
Example structure:
- Main email:
john@gmail.com - Shopping alias:
john+amazon@gmail.com - Newsletter alias:
john+newsletters@gmail.com - Banking alias:
john+banking@gmail.com
Gmail Plus Addressing
Gmail includes free alias functionality using the + symbol:
- Everything after the
+is ignored for delivery - Emails still reach your main inbox
- You can create unlimited variations
- Easy to filter by alias
How to use it:
- When signing up for a service, use
yourname+servicename@gmail.com - Set up a filter to label/organize emails to that alias
- If that service is breached, you know exactly which alias to abandon
Advanced Alias Strategy with Guard Email
For maximum protection, some services like Unsubscribe for Gmail's Guard Email feature offer:
- Randomly generated aliases (not predictable like plus addressing)
- Easy on/off control for each alias
- Automatic filtering and organization
- Disposable addresses you can delete when compromised
Select all
Protect Your Email with Aliases
Use unique email aliases for different services—when one gets breached, only that alias is affected.
Sign in →Change Passwords on Other Accounts
If you used the same password across multiple sites (you shouldn't, but many people do):
Prioritize these accounts:
- Financial services (banking, PayPal, credit cards)
- Social media (Facebook, Instagram, LinkedIn)
- Work email and systems
- Cloud storage (Google Drive, Dropbox)
- Password managers (extremely critical)
Use unique passwords for each service
Enable 2FA wherever available
Update password manager with new credentials
Monitor for Future Breaches
Set up ongoing monitoring so you know immediately if your email appears in future breaches:
Free monitoring services:
Have I Been Pwned (haveibeenpwned.com)
- Enter your email
- Enable notifications
- Checks against billions of breached records
Firefox Monitor (monitor.firefox.com)
- Continuous monitoring
- Email alerts for new breaches
Google Dark Web Report (for Google One subscribers)
- Monitors if your email appears on dark web
What to do when alerted:
- Identify which service was breached
- Change password for that service immediately
- Check for unauthorized access
- Consider abandoning that email alias if using plus addressing
Regular Security Checkups
Schedule quarterly security reviews:
Every 3 months:
- Review connected apps and revoke unused access
- Update passwords for critical accounts
- Check for suspicious filters or forwarding rules
- Verify 2FA is still active
- Review recent login activity
- Update security questions if used
Separate Email Addresses for Different Purposes
For maximum security, maintain different email addresses:
Personal email:
- Friends and family
- Personal subscriptions
- Shopping
Work email:
- Job-related communications only
- Never use for personal signups
Disposable email:
- One-time registrations
- Sketchy websites
- Free downloads requiring email
This compartmentalization limits damage when a breach occurs.
How to Check If Your Email Was Breached
If you suspect a breach but haven't received notification:
Have I Been Pwned
- Visit haveibeenpwned.com
- Enter your email address
- Review results showing:
- Which breaches included your email
- What data was exposed
- When the breach occurred
Google Password Checkup
- Visit passwords.google.com
- Click "Checkup"
- Review:
- Compromised passwords
- Reused passwords
- Weak passwords
Prevention for the Future
The best response to a data breach is preventing the next one:
1. Never Reuse Passwords
Every account should have a unique password. Password managers make this manageable.
2. Use Alias Emails
Give different email addresses (or aliases) to different services using plus addressing or Guard Email.
3. Enable 2FA Everywhere
Especially for email, banking, and social media accounts.
4. Be Selective About Sharing Your Email
Before providing your email, ask:
- Is this service trustworthy?
- Do I really need this account?
- Can I use an alias instead?
5. Regular Password Updates
Change passwords for critical accounts every 6-12 months, even without a breach.
6. Keep Software Updated
Security patches often address vulnerabilities that enable breaches.
7. Educate Yourself on Phishing
Most breaches start with phishing emails. Learn to identify them. Check out our guide on identifying phishing emails.
What NOT to Do After a Breach
Avoid these common mistakes:
❌ Don't Ignore It
"It probably won't affect me" is dangerous thinking. Act immediately.
❌ Don't Use Simple Password Variations
Changing Password1 to Password2 provides no real security.
❌ Don't Just Change Your Email Password
If you reused that password elsewhere, change it everywhere.
❌ Don't Click Links in Breach Notification Emails
Scammers send fake breach notifications. Go directly to the service's website instead.
❌ Don't Panic and Delete Everything
Systematic response is more effective than panicked deletion.
When to Consider a New Email Address
Sometimes, the best solution is starting fresh with a new email address:
Consider a new email if:
- Your email appears in multiple major breaches
- You're receiving overwhelming amounts of spam
- You've used the same email for 10+ years across hundreds of services
- Your email is already widely circulated on spam lists
If you do create a new email:
- Set it up with 2FA from day one
- Use a password manager for a unique, strong password
- Never share it publicly
- Use aliases for all signups
- Gradually migrate important accounts to the new address
- Keep the old email active for 6-12 months to catch stragglers
The Bottom Line
Data breaches are inevitable—even major companies with sophisticated security get breached. What matters is your response and future prevention strategy.
Immediate actions (do these now):
- Change your password to something strong and unique
- Enable two-factor authentication
- Review account activity for suspicious access
- Revoke access from unknown apps
- Scan your devices for malware
Long-term protection:
- Use email aliases for different services
- Enable 2FA everywhere possible
- Use a password manager with unique passwords
- Monitor for future breaches with Have I Been Pwned
- Conduct quarterly security reviews
Protect Your Email Address Moving Forward
The best time to implement email security was before the breach. The second-best time is right now.
Unsubscribe for Gmail offers tools to help you regain control:
- Guard Email creates unique aliases to protect your main address
- Inbox Shield blocks compromised addresses from receiving future spam
- Easy management of which addresses receive emails
Don't wait for the next breach. Take control of your email security today.
Sign in
or continue with