Someone gained access to a business email account, a phishing attack succeeded, or you suspect business email compromise (BEC). Act fast — email access can lead to financial fraud, data theft, and account takeover.
Call Now: (587) 318-0019Change the password immediately
Change the compromised account's password from a DIFFERENT device (not the potentially compromised one). Use a strong, unique password. If you can't change it, the attacker may have already changed it — call us.
Enable multi-factor authentication (MFA)
If MFA isn't already enabled, turn it on now. This prevents the attacker from using the stolen password even if they still have it.
Check sent items and rules
Look at the Sent folder for emails you didn't send (especially to clients, vendors, or banks). Check email rules — attackers often create forwarding rules to silently copy all your email to their account.
Warn your contacts
If the attacker sent emails from your account, notify those recipients immediately. They may receive phishing emails or fake invoices that appear to come from you.
Call us
Our team at (587) 318-0019 can audit the full extent of the compromise, check for forwarding rules, revoke attacker sessions, and secure the account properly.
Don't ignore suspicious login alerts. If Microsoft or Google warned you about an unfamiliar sign-in, take it seriously immediately.
Don't click "unsubscribe" on suspicious emails that arrived during the compromise. They may be phishing attempts designed to look like account notifications.
Don't use the same password on other accounts. If you reused the compromised password elsewhere, change those accounts too — attackers try stolen credentials on other services.
Don't assume it's contained after changing the password. Attackers often install persistent access (forwarding rules, OAuth apps, delegate access) that survives a password change.
We audit the compromised account for forwarding rules, delegate access, OAuth app authorizations, mailbox rules, and suspicious sign-in history. We revoke all active sessions.
Did the attacker access just email, or also SharePoint, OneDrive, Teams? Did they download contacts or files? Did they send emails to clients? We determine the full blast radius.
Business Email Compromise (BEC) often targets wire transfers and invoice payments. We check if the attacker sent fake invoices, changed banking details, or initiated fraudulent requests to your clients or accounting team.
We implement MFA across the organization, reset compromised credentials, configure conditional access policies, and enable audit logging to detect future unauthorized access.
If personal data was accessed, PIPEDA may require breach notification. We help you assess what data was exposed and support your legal team with documentation.
Prevent this from happening again. Multi-factor authentication, email filtering, and security training prevent most email compromises before they happen.
Learn About Email Security