Data Breach Response Steps
Move quickly to contain damage and prevent account takeovers after a breach or credential leak.
Immediate actions
- Change passwords from a clean device; enable app‑based 2FA.
- Revoke sessions, connected apps, and API keys.
- Rotate recovery codes; update backup email/phone.
Payments & identity
- Monitor transactions; freeze cards if needed.
- Watch for new‑account alerts; consider credit monitoring (where available).
Communications
- Beware of follow‑on phishing impersonating support.
- Keep breach notices and service emails in your evidence folder.
Need help applying this?
Open a case and we’ll tailor the steps to your situation.