Confirm what you actually entered or clicked

    The fix for phishing depends on what the attacker now has. A 60-second inventory makes the next two steps far more effective.

    What 'exposed' means here

      • Just clicked a link, didn't enter anything → low risk, but device should still be checked
      • Entered username + password → that account is compromised, and any account using the same password
      • Entered a 2FA code → assume the attacker is logging in right now
      • Downloaded a file → assume malware until you've scanned the device

    More from Communications Security

    No image

    Confirm the inbox is actively compromised

    Pin down which account, who's been emailed, and which sessions are unfamiliar.

    No image

    Make the next phishing email harmless

    Use a password manager, hardware key and email aliases so a single phish can't cascade.

    No image

    Use specialised victim resources

    Sextortion has dedicated services — they're free, confidential and fast.