EMERGENCY RESPONSE GUIDE

Quick response guides for common digital emergencies

1 Contain / 2 Recover / 3 Prevent

1 Contain

Stop the damage immediately

  1. Change your password immediately: Do this from a secure, trusted device. Use a strong, unique password the attacker can’t guess.
  2. Log out all other sessions: Most services have a “sign out everywhere” option in security settings. Use it to kick the attacker out.
  3. Enable two-factor authentication: If not already on, enable 2FA now. Prefer an authenticator app or security key over SMS.
  4. Use account recovery if locked out: Start the platform’s recovery process immediately, before the attacker changes your recovery email or phone number.
  5. Warn your contacts: The attacker may send phishing or scam messages pretending to be you. Let friends and family know not to trust recent messages from your account.

2 Recover

Get back to normal

  1. Review account settings: Check for unfamiliar forwarding rules, linked devices, authorized apps, and changed recovery email or phone number. Remove anything you don’t recognize.
  2. Check what the intruder did: Review sent items, posts, and messages. Delete anything fraudulent and notify anyone who was affected.
  3. Secure connected accounts: If this email was hacked, change passwords on accounts that use it for login or recovery. If you reused the same password anywhere else, change those too.
  4. Report to the platform: Most services have dedicated “my account was hacked” support. File a report so they can monitor for ongoing threats.
  5. Recover deleted data: Check Trash and recently deleted folders. Act quickly, as these often auto-purge after a set period.

3 Prevent

Stop it from happening again

  • Check haveibeenpwned.com to see if your credentials appeared in known data breaches.
  • Use a unique, strong password for every account. A password manager makes this practical.
  • Keep 2FA enabled on all accounts that offer it. Prefer authenticator apps or security keys over SMS.
  • Be skeptical of emails asking you to “verify” or “log in.” Navigate to sites directly instead of clicking links.
  • Audit privacy settings and remove unnecessary third-party app connections.
  • Set up login alerts where available so you’ll know immediately if someone else accesses your account.

Key Contacts

Outside the United States? View international reporting resources

Sign up for monthly reminders

Protect yourself with monthly updates highlighting recent hacks, common scams to watch out for, and emerging threats.