Skip to content

Data Breach Checklist

Interactive step-by-step checklist for what to do after a data breach. Track progress through password changes, credit monitoring, and more.

Overall Progress
0 / 31 completed
0%Complete critical items first
Immediate
0/7
24 Hours
0/8
1 Week
0/8
Ongoing
0/8

Immediate Actions (First 1-2 Hours)

Take these steps right away to minimize ongoing damage from the breach.

Change the compromised password immediatelyCritical

Change the password for the breached account right away. Use a strong, unique password with at least 16 characters combining uppercase, lowercase, numbers, and symbols. Do not reuse any password you have used before.

Change passwords on any accounts that used the same passwordCritical

If you reused the breached password on other accounts, change those immediately. Credential stuffing attacks test stolen passwords across hundreds of services automatically. Each account should have a completely unique password.

Enable two-factor authentication (2FA)Critical

Enable 2FA on the breached account and any other important accounts. Use an authenticator app (like Authy or Google Authenticator) or a hardware key (like YubiKey) rather than SMS, which can be intercepted via SIM swapping attacks.

Check bank and financial accounts for unauthorized transactionsCritical

Log in to all bank accounts, credit cards, and payment services (PayPal, Venmo, etc.). Look for any transactions you do not recognize, no matter how small. Criminals often test with micro-transactions before making larger fraudulent charges.

Log out of all active sessions on the breached accountCritical

Most services have an option to sign out of all devices/sessions (check security settings). This terminates any session an attacker may have established using your stolen credentials.

Review account settings for unauthorized changesImportant

Check your email address, phone number, recovery options, and connected apps on the breached account. Attackers often change recovery information to maintain access even after you change your password.

Document and screenshot any evidence of the breachImportant

Take screenshots of breach notifications, suspicious emails, unauthorized transactions, or any other evidence. This documentation may be needed for filing reports with your bank, law enforcement, or the FTC.

Within 24 Hours

Complete these actions within the first day to protect your identity and finances.

Place a credit freeze with all three credit bureausCritical

Contact Equifax (equifax.com/personal/credit-report-services), Experian (experian.com/freeze), and TransUnion (transunion.com/credit-freeze) to freeze your credit. A freeze prevents anyone from opening new credit accounts in your name. It is free and does not affect your credit score.

Set up a fraud alert on your credit reportsCritical

Place an initial fraud alert with one of the three credit bureaus (they are required to notify the other two). This alert requires creditors to verify your identity before opening new accounts. An initial alert lasts one year and is free.

Update security questions on important accountsImportant

If any of your security question answers were exposed, change them on all accounts that use them. Consider using random answers stored in a password manager rather than real answers, which can often be found through social media.

Check email for unauthorized forwarding rules or filtersImportant

Attackers often set up email forwarding rules to silently receive copies of your emails (including password resets). Check your email settings for any forwarding addresses, filters, or rules you did not create.

Set up a password manager if you do not have oneImportant

Use a reputable password manager (like Bitwarden, 1Password, or KeePass) to generate and store unique passwords for every account. This prevents password reuse, which is the number one cause of account compromise after breaches.

Contact your bank to flag your account for fraud monitoringImportant

Call your bank and credit card companies to inform them of the breach. Request enhanced fraud monitoring, new card numbers if payment data was exposed, and ask about their fraud protection policies and dispute procedures.

Review and revoke access for connected third-party appsRecommended

Go to the security settings of your breached account and review all third-party apps with access. Revoke any you do not recognize or no longer use. Attackers can use OAuth tokens from connected apps to maintain access.

Notify your employer if work accounts may be affectedRecommended

If you used the same password for work accounts or if work data was potentially exposed, inform your IT department or security team immediately. They can take steps to protect company systems and data.

Within 1 Week

Follow up with these protective measures during the first week.

Enroll in credit monitoring servicesImportant

Sign up for a credit monitoring service to receive alerts about changes to your credit report. Many breach notifications include free monitoring (check the breach notification email). You can also use free services like Credit Karma or annualcreditreport.com.

File an identity theft report if personal data was exposedImportant

If SSN, driver's license, or other identity documents were compromised, file a report at IdentityTheft.gov (FTC). This creates an official Identity Theft Report you can use to dispute fraudulent accounts and transactions.

Audit all online accounts for suspicious activityImportant

Review login history and recent activity on all your important accounts: email, social media, cloud storage, shopping sites, and financial services. Look for logins from unfamiliar locations, devices, or IP addresses.

Update recovery email and phone number on all accountsImportant

Ensure your recovery contact information is current and secure on all accounts. Use a secondary email address that is not publicly associated with your primary accounts. Consider using a Google Voice number for account recovery.

Research exactly what data was compromisedRecommended

Check the breach notification and resources like HaveIBeenPwned.com to understand exactly what data was exposed (passwords, emails, SSN, financial data, etc.). This helps you prioritize your response based on the specific risks.

Review and tighten social media privacy settingsRecommended

Attackers use personal information from social media for targeted phishing and social engineering. Review privacy settings on all social platforms, remove personal details from public profiles, and be cautious about what you share.

Check for unauthorized tax filings (if SSN was exposed)Recommended

If your Social Security Number was compromised, create an account at IRS.gov to check your tax records. Consider filing an IRS Identity Protection PIN request to prevent fraudulent tax returns filed in your name.

File a police report if significant financial loss occurredRecommended

If you experienced financial loss or identity theft, file a report with your local police department. While they may not investigate directly, the report can be valuable when disputing charges or dealing with creditors.

Ongoing Monitoring

Continue these practices to protect yourself long-term after a breach.

Review credit reports regularly (at least quarterly)Important

Request your free credit reports from annualcreditreport.com. Stagger requests across the three bureaus (one every 4 months) for year-round monitoring. Look for accounts you did not open, inquiries you did not authorize, and incorrect personal information.

Be vigilant against phishing attemptsImportant

After a breach, expect increased phishing attempts using your leaked data to look legitimate. Be suspicious of emails, texts, or calls referencing the breach, asking you to verify information, or creating urgency. Never click links in unexpected messages.

Review financial account activity weeklyImportant

Check bank and credit card statements at least weekly for the first few months after a breach. Set up transaction alerts for any purchase over a threshold amount. Report unauthorized transactions immediately to benefit from fraud protection policies.

Monitor the dark web for your personal informationRecommended

Use services like HaveIBeenPwned.com, your password manager's breach monitoring, or credit monitoring services that include dark web scanning. These can alert you if your data appears in new breaches or is being sold.

Watch for suspicious physical mailRecommended

Monitor your physical mailbox for unexpected credit cards, loan offers, bills for unknown accounts, or tax documents. These could indicate someone is using your identity to open accounts. Set up USPS Informed Delivery to track incoming mail.

Rotate passwords for critical accounts every 3-6 monthsRecommended

Periodically change passwords for your most sensitive accounts (email, banking, cloud storage). Use your password manager to generate and store strong unique passwords. Also rotate passwords if you hear about any new breach affecting a service you use.

Back up 2FA recovery codes securelyRecommended

Store your two-factor authentication recovery codes in a secure, offline location (printed and locked, or encrypted offline storage). If you lose access to your 2FA device, these codes may be the only way to recover your accounts.

Consider identity theft insuranceRecommended

Evaluate whether identity theft insurance makes sense for your situation. Many homeowner or renter insurance policies offer it as an add-on. Standalone policies typically cover expenses related to identity theft recovery, such as legal fees and lost wages.

About This Checklist

This checklist provides a comprehensive response plan for data breaches. Your progress is saved automatically in your browser. Focus on Critical items first, then Important, then Recommended. If you suspect ongoing unauthorized access, consider contacting a cybersecurity professional for assistance.

How to Use Data Breach Checklist

1

Open Data Breach Checklist

Navigate to Data Breach Checklist in your browser — no installation or sign-up required.

2

Enter your data

Type, paste, or upload the content you want to process into the input area.

3

Configure options

Adjust any available settings to customize the output to your needs.

4

Get your result

The result appears instantly. Copy it to your clipboard or download it as a file.

Frequently Asked Questions

Data Breach Checklist is a free online web development tool. Interactive step-by-step checklist for what to do after a data breach. Track progress through password changes, credit monitoring, and more.