Skip to main content

My Email Was Hacked. Now what?

In an age where digital communication is the cornerstone of daily life, the security of our inbox stands as a vital shield against potential cyber threats. Yet, despite our best efforts, email hacking remains a pervasive issue. Cybercriminals will stealthfully use your email to send phishing emails to your customers and vendors or they will log into your accounts (banking, commerce, credit cards, etc) via a password reset.

Understanding the implications, preventive measures, and corrective actions surrounding email hacking becomes a necessary skill in safeguarding our personal data and the security of our business. In this blog, we delve into the consequences, and most importantly, empowering insights on how to recover our email account. This is crucial not only for yourself, it’s worth sharing with your team!

Immediate Steps To Take When Your Email Is Hacked

  1. Change your email password to a unique and strong password and make sure all devices are logged out.
  2. Enable multi-factor authentication using an authenticator phone app.
  3. Check phone numbers that were assigned to email account and remove any suspicious immediately. A hacker will add their phone number so they can bypass multi-factor authentication.
  4. Contact your email provider to assist with security measures. If you’re using a free e-mail service help will be limited to online self-service. You should change to a paid business e-mail account.
  5. Isolate your computer from the network and check for viruses and malware.
  6. Check your sent and deleted emails to see if your email was used to send phishing emails. Advise all recipients that your email was compromised.
  7. Modify any other accounts that use the same password to a unique and strong password.
  8. Change security questions on the e-mail service.
  9. Notify all vendors and customers who use any of your banking services.
  10. Report it.

You should report the incident to the Internet Crime Complaint Center ( which is run by the Federal Bureau of Investigation (FBI). The FBI uses the reports to investigate crimes, track trends, and threats, and, in some cases, even freeze stolen funds. Just as importantly, IC3 shares reports of crime throughout its vast network.

You should consider adding additional safeguards of email spam filtering, MDR, 24/7 security operations monitoring, password manager, DNS filtering, cloud application monitoring, drive encryption, and managed updates.

Avoid Scam by Spam

Do you have a proper email filtration in your organization? We design, deploy, and support IT solutions.

Our Insight

Did you know that 60% of companies go out of business within 6 months of a breach? And 80% of risks are due to internal negligence? Now more than ever, we need to be mindful of cyber protection and data loss! We provide automated IT network reports on a daily, weekly, monthly, and quarterly basis. We monitor your network using state-of-the-art security and automated reporting, schedule backups and update software remotely. What’s even better, our Help Desk is only a click or call away to assist your team regarding your IT-related concerns, offering you the peace of mind you deserve.


Unfortunately, there is no magic solution to protect your systems and data. You must have a comprehensive, multi-layered approach and you need to adjust for the ever-changing challenges and potential threats.

Enhance Your Network Security

You must be prepared to isolate and eliminate the attack quickly before it takes over your entire network and your systems. Don’t gamble with the security of your organization and your customers – request your complimentary evaluation today.

Managed IT Services

Why You Need Multi-Factor Authentication

Managed Security Services

Protection Against New Cyber Attacks