Skip to content

How to Protect Your Email After a Data Breach

Data breaches have become alarmingly common. In 2024 alone, over 3,000 publicly disclosed breaches exposed billions of email addresses and passwords. If you've received a notification that your email was part of a breach—or suspect it might have been—taking immediate action is crucial to protecting your digital identity.

This guide walks you through exactly what to do when your email is compromised, from immediate response to long-term protection strategies.

Signs Your Email Was Part of a Data Breach

Before we dive into solutions, let's identify the warning signs:

Obvious Indicators

  • Breach notification from a service you use
  • Email from Have I Been Pwned or similar monitoring services
  • Suspicious login attempts notifications from Gmail
  • Password reset emails you didn't request
  • Locked out of accounts due to changed passwords

Subtle Warning Signs

  • Sudden increase in spam emails
  • Unknown subscriptions to newsletters you didn't sign up for
  • Friends receiving spam from your address
  • Emails in Sent folder you didn't send
  • New filters or forwarding rules you didn't create

If you notice any of these signs, assume your email has been compromised and act immediately.

Immediate Steps: First 24 Hours

Time is critical when your email has been breached. Follow these steps in order:

1. Change Your Password Immediately

Do this before anything else:

  1. Go to your email provider's password change page
  2. Choose a strong, unique password:
    • At least 16 characters
    • Mix of uppercase, lowercase, numbers, symbols
    • No dictionary words
    • No personal information
    • Nothing you've used before

Password manager recommended: Use 1Password, Bitwarden, or Dashlane to generate and store complex passwords.

Bad password examples:

  • Password123!
  • JohnSmith2025
  • ILovePizza!

Good password example:

  • kR9#mQ2$nB5@wL8&pT3

2. Enable Two-Factor Authentication (2FA)

2FA adds a critical second layer of security. Even if someone has your password, they can't access your account without the second factor.

For Gmail:

  1. Go to myaccount.google.com
  2. Click "Security"
  3. Select "2-Step Verification"
  4. Choose your method (authenticator app recommended over SMS)

Best 2FA methods (in order):

  1. Authenticator apps (Google Authenticator, Authy, Microsoft Authenticator)
  2. Hardware keys (YubiKey, Google Titan)
  3. SMS codes (better than nothing, but vulnerable to SIM swapping)

Never use:

  • Email as your 2FA method (circular vulnerability)
  • Easily guessed security questions

3. Review Account Activity

Check what the attacker might have accessed or changed:

In Gmail:

  1. Click gear icon → "See all settings"

  2. Review each tab:

    • Filters: Look for unknown forwarding rules
    • Forwarding: Check for unauthorized forwarding addresses
    • Delegation: Verify no unknown users have access
    • Labels: Look for suspicious organization
  3. Check "Last account activity" at bottom of inbox

    • Review recent access locations
    • Note any suspicious IP addresses or locations

4. Revoke Suspicious Access

Review connected apps:

  1. Go to myaccount.google.com/permissions
  2. Review all apps with email access
  3. Remove anything you don't recognize or no longer use

Why this matters: Changing your password doesn't revoke access to apps that already have permission.

5. Scan for Malware

If your email was compromised, your device might be infected:

  1. Run a full system scan with updated antivirus software
  2. Check browser extensions for suspicious additions
  3. Review recently installed applications
  4. Clear browser cache and cookies

Longer-Term Protection: Securing Your Future

Once immediate threats are addressed, implement these strategies for lasting security:

Use Email Aliases for Better Protection

This is one of the most powerful long-term strategies against data breaches.

What Are Email Aliases?

Email aliases let you create multiple email addresses that all forward to your main inbox. When a service gets breached, only that specific alias is compromised—not your main email address.

Example structure:

  • Main email: john@gmail.com
  • Shopping alias: john+amazon@gmail.com
  • Newsletter alias: john+newsletters@gmail.com
  • Banking alias: john+banking@gmail.com

Gmail Plus Addressing

Gmail includes free alias functionality using the + symbol:

  • Everything after the + is ignored for delivery
  • Emails still reach your main inbox
  • You can create unlimited variations
  • Easy to filter by alias

How to use it:

  1. When signing up for a service, use yourname+servicename@gmail.com
  2. Set up a filter to label/organize emails to that alias
  3. If that service is breached, you know exactly which alias to abandon

Advanced Alias Strategy with Guard Email

For maximum protection, some services like Unsubscribe for Gmail's Guard Email feature offer:

  • Randomly generated aliases (not predictable like plus addressing)
  • Easy on/off control for each alias
  • Automatic filtering and organization
  • Disposable addresses you can delete when compromised

Select all

    Protect Your Email with Aliases

    Use unique email aliases for different services—when one gets breached, only that alias is affected.

    Sign in →

    Change Passwords on Other Accounts

    If you used the same password across multiple sites (you shouldn't, but many people do):

    1. Prioritize these accounts:

      • Financial services (banking, PayPal, credit cards)
      • Social media (Facebook, Instagram, LinkedIn)
      • Work email and systems
      • Cloud storage (Google Drive, Dropbox)
      • Password managers (extremely critical)
    2. Use unique passwords for each service

    3. Enable 2FA wherever available

    4. Update password manager with new credentials

    Monitor for Future Breaches

    Set up ongoing monitoring so you know immediately if your email appears in future breaches:

    Free monitoring services:

    • Have I Been Pwned (haveibeenpwned.com)

      • Enter your email
      • Enable notifications
      • Checks against billions of breached records
    • Firefox Monitor (monitor.firefox.com)

      • Continuous monitoring
      • Email alerts for new breaches
    • Google Dark Web Report (for Google One subscribers)

      • Monitors if your email appears on dark web

    What to do when alerted:

    1. Identify which service was breached
    2. Change password for that service immediately
    3. Check for unauthorized access
    4. Consider abandoning that email alias if using plus addressing

    Regular Security Checkups

    Schedule quarterly security reviews:

    Every 3 months:

    • Review connected apps and revoke unused access
    • Update passwords for critical accounts
    • Check for suspicious filters or forwarding rules
    • Verify 2FA is still active
    • Review recent login activity
    • Update security questions if used

    Separate Email Addresses for Different Purposes

    For maximum security, maintain different email addresses:

    Personal email:

    • Friends and family
    • Personal subscriptions
    • Shopping

    Work email:

    • Job-related communications only
    • Never use for personal signups

    Disposable email:

    • One-time registrations
    • Sketchy websites
    • Free downloads requiring email

    This compartmentalization limits damage when a breach occurs.

    How to Check If Your Email Was Breached

    If you suspect a breach but haven't received notification:

    Have I Been Pwned

    1. Visit haveibeenpwned.com
    2. Enter your email address
    3. Review results showing:
      • Which breaches included your email
      • What data was exposed
      • When the breach occurred

    Google Password Checkup

    1. Visit passwords.google.com
    2. Click "Checkup"
    3. Review:
      • Compromised passwords
      • Reused passwords
      • Weak passwords

    Prevention for the Future

    The best response to a data breach is preventing the next one:

    1. Never Reuse Passwords

    Every account should have a unique password. Password managers make this manageable.

    2. Use Alias Emails

    Give different email addresses (or aliases) to different services using plus addressing or Guard Email.

    3. Enable 2FA Everywhere

    Especially for email, banking, and social media accounts.

    4. Be Selective About Sharing Your Email

    Before providing your email, ask:

    • Is this service trustworthy?
    • Do I really need this account?
    • Can I use an alias instead?

    5. Regular Password Updates

    Change passwords for critical accounts every 6-12 months, even without a breach.

    6. Keep Software Updated

    Security patches often address vulnerabilities that enable breaches.

    7. Educate Yourself on Phishing

    Most breaches start with phishing emails. Learn to identify them. Check out our guide on identifying phishing emails.

    What NOT to Do After a Breach

    Avoid these common mistakes:

    ❌ Don't Ignore It

    "It probably won't affect me" is dangerous thinking. Act immediately.

    ❌ Don't Use Simple Password Variations

    Changing Password1 to Password2 provides no real security.

    ❌ Don't Just Change Your Email Password

    If you reused that password elsewhere, change it everywhere.

    Scammers send fake breach notifications. Go directly to the service's website instead.

    ❌ Don't Panic and Delete Everything

    Systematic response is more effective than panicked deletion.

    When to Consider a New Email Address

    Sometimes, the best solution is starting fresh with a new email address:

    Consider a new email if:

    • Your email appears in multiple major breaches
    • You're receiving overwhelming amounts of spam
    • You've used the same email for 10+ years across hundreds of services
    • Your email is already widely circulated on spam lists

    If you do create a new email:

    1. Set it up with 2FA from day one
    2. Use a password manager for a unique, strong password
    3. Never share it publicly
    4. Use aliases for all signups
    5. Gradually migrate important accounts to the new address
    6. Keep the old email active for 6-12 months to catch stragglers

    The Bottom Line

    Data breaches are inevitable—even major companies with sophisticated security get breached. What matters is your response and future prevention strategy.

    Immediate actions (do these now):

    1. Change your password to something strong and unique
    2. Enable two-factor authentication
    3. Review account activity for suspicious access
    4. Revoke access from unknown apps
    5. Scan your devices for malware

    Long-term protection:

    1. Use email aliases for different services
    2. Enable 2FA everywhere possible
    3. Use a password manager with unique passwords
    4. Monitor for future breaches with Have I Been Pwned
    5. Conduct quarterly security reviews

    Protect Your Email Address Moving Forward

    The best time to implement email security was before the breach. The second-best time is right now.

    Unsubscribe for Gmail offers tools to help you regain control:

    • Guard Email creates unique aliases to protect your main address
    • Inbox Shield blocks compromised addresses from receiving future spam
    • Easy management of which addresses receive emails

    Don't wait for the next breach. Take control of your email security today.