What to Do If Someone Tries to Access Your Account? A Quick Reaction Guide

What to Do If Someone Tries to Access Your Account? A Quick Reaction Guide

5 min read
Author image By The Security Planet
A smartphone screen showing a security alert for a suspicious login attempt.

That heart-stopping notification: “We detected a new sign-in to your account from an unrecognized device.” Panic sets in. Has someone hacked you? Are they reading your emails right now? In this critical moment, every second counts. How you react can mean the difference between a minor inconvenience and a major personal data catastrophe. This is your emergency guide to taking back control.

Your Immediate Action Plan

Step 1: Don’t Panic, Act Fast

The attacker is counting on your panic and confusion. Take a deep breath. Your goal is to move quickly but methodically. Do not ignore the alert, even if you think it might be a mistake. The first few minutes are the most critical to lock the attacker out before they can do significant damage, such as changing your password and locking you out permanently.

⚠️ Crucial Warning: Be wary of phishing attempts disguised as security alerts. Never click a link directly in an email or text message. Instead, go directly to the official website or app of the service in question to verify the alert and take action.

Step 2: Immediately Change Your Password

This is your absolute first priority. From a trusted, secure device (not one you suspect might be compromised), log in to the account and change your password. Create a strong, unique password that you have never used on any other site.

A strong password includes:

  • At least 12-16 characters.
  • A mix of uppercase letters, lowercase letters, numbers, and symbols.
  • No personal information (like your name, birthday, or pet’s name).

Using a password manager is the best way to generate and store these complex passwords securely.

Step 3: Revoke All Active Sessions

Changing your password might not be enough if the attacker is already logged in. Most major services (like Google, Facebook, and Microsoft) have a security setting that shows you all the devices currently logged into your account. Find this section and use the “Sign out of all other sessions” or “Log out everywhere” option. This will forcibly kick the intruder out.

💡 Where to find this? Look in your account settings under “Security,” “Login Activity,” or “Where You’re Logged In.” Review the list of devices and locations for anything you don’t recognize.

Step 4: Enable Two-Factor Authentication (2FA)

If you haven’t already, now is the time. 2FA is the single most effective step you can take to prevent future account takeovers. It requires a second form of verification in addition to your password, usually a code from an authenticator app on your phone. Even if an attacker steals your password, they won’t be able to log in without this second code.

  • Best Option: Use a dedicated authenticator app like Aegis (Android) or Tofu (iOS).
  • Good Option: Using your phone number for SMS codes is better than nothing, but it is vulnerable to SIM-swapping attacks.

Step 5: Review Account Activity and Permissions

Once you’ve secured the account, it’s time to check for damage. Attackers often make subtle changes to maintain access or exploit your account. Carefully review:

  • Recovery Information: Check if the attacker has changed your recovery email address or phone number.
  • Third-Party App Access: Look at which apps have permission to access your account data. Revoke access for any app you don’t recognize or no longer use.
  • Sent Items & Trash: Check your email’s sent folder for any messages the attacker might have sent, and look in the trash for deleted alerts or communications.
  • Forwarding Rules: In your email settings, ensure the attacker hasn’t set up a rule to secretly forward all your incoming messages to their own address.

An Account Breach is a Wake-Up Call

Successfully fending off an account takeover attempt is a victory, but it’s also a warning. It means your credentials were likely exposed in a data breach somewhere else. Use this as motivation to strengthen your security across the board. A few minutes of prevention today can save you from a digital disaster tomorrow.

Shopping Cart
Scroll to Top