{"id":2771,"date":"2026-04-21T10:00:00","date_gmt":"2026-04-21T02:00:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=2771"},"modified":"2026-03-10T10:39:21","modified_gmt":"2026-03-10T02:39:21","slug":"what-to-do-when-hackers-have-your-email-address","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/","title":{"rendered":"What to Do When Hackers Have Your Email Address"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> > <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> > What to Do When Hackers Have Your Email Address<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-md80g\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-md80g \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-md80g button-1 undefined\" data-id=\"eb-advance-heading-md80g\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">What to Do When Hackers Have Your Email Address<\/span><\/h2><p class=\"eb-ah-subtitle\">April 21, 2026<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address-1024x538.jpg\" alt=\"What to Do When Hackers Have Your Email Address\" class=\"wp-image-2772\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Have you recently noticed a sharp increase in junk mail? Are you receiving strange, overly personal emails that seem to know where you work or who your boss is?<\/p>\n\n\n\n<p>This isn\u2019t just random noise. It is often the first indicator that your professional email address has been leaked in a data breach. When your address falls into the wrong hands, you haven&#8217;t necessarily been &#8220;hacked&#8221; (meaning they don&#8217;t have your password yet), but you have been put on a target list.<\/p>\n\n\n\n<p>Hackers use this contact information to prepare for highly personalized, dangerous attacks called <a href=\"https:\/\/lookafter.com\/blog\/safeguarding-against-spear-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">spear phishing<\/a>. They are gathering intelligence and testing your defences before attempting to break into your account. Treat that influx of spam as a warning siren.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Phase 1: Harden Your Defences Immediately<\/h2>\n\n\n\n<p>Your goal is to secure the perimeter before a &#8220;leak&#8221; becomes a &#8220;breach&#8221;.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stop Password Reuse: <\/strong>If you use the same password for your email as you do for other websites, <strong>change your email password immediately.<\/strong> Assume that if hackers have your email address, they will try to &#8220;guess&#8221; your password using data from other leaks.<br><strong>Pro Tip:<\/strong> Use a <strong>Password Manager<\/strong> to create long, unique passwords so you don&#8217;t have to memorize them.<\/li>\n\n\n\n<li><strong>Enable Multi-Factor Authentication (MFA): <\/strong>MFA is your ultimate shield. It requires a second code after you enter your password. Even if a hacker correctly guesses your password, <strong>they cannot get in<\/strong> without that second code.<\/li>\n\n\n\n<li><strong>Check Your Visibility: <\/strong>Use reputable tools like <strong>Have I Been Pwned<\/strong> to see which specific data breaches included your email address. This helps you know which other accounts might also need a password refresh.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Phase 2: Spot the &#8220;Professional&#8221; Scams<\/h2>\n\n\n\n<p>Because hackers know your email and where you work, their scams will look much more convincing than typical &#8220;I inherited a million dollars&#8221; spam.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Urgent Request:<\/strong> Be suspicious of any email \u2014 even if it looks like it&#8217;s from your CEO \u2014 that demands immediate action, asks you to buy gift cards, or requests a wire transfer due to an &#8220;emergency&#8221;.<\/li>\n\n\n\n<li><strong>The &#8220;Unpaid Invoice&#8221; Scam:<\/strong> You may receive an email from a &#8220;vendor&#8221; or &#8220;supplier&#8221; claiming that a payment is overdue. It often includes an &#8220;invoice&#8221; attachment (which is actually malware) or a link to a fake portal to &#8220;update your payment details&#8221;.<\/li>\n\n\n\n<li><strong>The &#8220;Payroll or Settlement&#8221; Trap:<\/strong> Hackers often send fake emails pretending to be the Payroll Department. They may mention &#8220;upcoming payments&#8221;, &#8220;salary revision&#8221;, or &#8220;employee sanctions&#8221; to trigger curiosity or panic. Never open attachments in these emails; instead, verify directly through your company\u2019s official HR portal.<\/li>\n\n\n\n<li><strong>The &#8220;IT System Update&#8221;: <\/strong>You might get an email that looks like a technical alert, stating your password is about to expire or your mailbox is full. It will provide a &#8220;Sign-in&#8221; link to resolve the issue. This is a classic trick to steal your login credentials on a fake login page.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Phase 3: Report and Stay Alert<\/h2>\n\n\n\n<p>If you receive an email that feels &#8220;off,&#8221; simply deleting it isn&#8217;t enough. Taking an extra minute to report it can protect your entire team.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The &#8220;Hover&#8221; Test:<\/strong> Before clicking any link, hover your mouse over it. A small box will appear showing the actual destination. If the link says YourCompany.com but the hover text shows RandomSite.ru, it\u2019s a trap.<\/li>\n\n\n\n<li><strong>Report to the IT Team:<\/strong> If you spot a suspicious email, forward it immediately to the IT Department or your designated Security Team. They can analyze the headers of the email, block the sender\u2019s domain for the whole company, and check if any other employees have been targeted.<\/li>\n\n\n\n<li><strong>Alert the Email Service Provider:<\/strong> If you are using a professional mail service, you can usually report the email directly to the provider for review. This helps improve the global filters that catch these scams before they even reach an inbox.<\/li>\n\n\n\n<li><strong>Tune Your Mental Filters:<\/strong> Once your email is on a &#8220;leak list&#8221;, expect more attempts. Remain cautious about what you share publicly online (like on LinkedIn) as hackers use that info to make their next scam even more convincing.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion: Stay One Step Ahead<\/h2>\n\n\n\n<p>Finding out your email address is in the hands of hackers can be unsettling, but it doesn&#8217;t have to be a disaster. In the digital workplace, your email address is essentially your professional &#8220;front door&#8221; \u2014 just because someone has the address doesn&#8217;t mean they have the key.<\/p>\n\n\n\n<p>By staying vigilant, questioning &#8220;urgent&#8221; requests, and leaning on your IT team for support, you turn a potential security breach into a minor inconvenience.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions (FAQ)<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><strong>1. Does &#8220;leaked&#8221; mean the same thing as &#8220;hacked&#8221;?<\/strong><\/strong><\/h4>\n\n\n\n<p>No. A leak means your email address is on a list of contacts. A hack means they have actually accessed your inbox. A leak is usually the &#8220;scouting&#8221; phase before an attempted hack.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><strong><strong>2. Why should I care if they &#8220;only&#8221; have my email address?<\/strong><\/strong><\/strong><\/h4>\n\n\n\n<p>Because they can use it to send you &#8220;phishing&#8221; emails (like the Payroll or Invoice examples) that look real, hoping you&#8217;ll eventually click a link and give up your actual password.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><strong><strong>3. Why am I suddenly getting more spam than my coworkers?<\/strong><\/strong><\/strong><\/h4>\n\n\n\n<p>Your email address was likely included in a specific database leak (from a website or service you signed up for) that your coworkers didn&#8217;t use.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><strong><strong>4. Is it safe to click &#8220;Unsubscribe&#8221; on these new spam emails?<\/strong><\/strong><\/strong><\/h4>\n\n\n\n<p>Be careful. On suspicious spam, clicking &#8220;Unsubscribe&#8221; tells the hacker that your email is active and being read, which often leads to more targeted attacks.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><strong><strong><strong>5. Should I get a new email address?<\/strong><\/strong><\/strong><\/strong><\/h4>\n\n\n\n<p>In a professional setting, no. Simply secure your current account with a strong, unique password and Multi-Factor Authentication (MFA). This makes your email address useless to a hacker.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seeing an influx of junk mail? Your email address might be in the hands of hackers. Learn how to protect your work account and spot phishing scams.<\/p>\n","protected":false},"author":1,"featured_media":2772,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"[\"content\",\"tags\"]","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[16,17],"class_list":["post-2771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-email","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What to Do When Hackers Have Your Email Address<\/title>\n<meta name=\"description\" content=\"Seeing an influx of junk mail? Your email address might be in the hands of hackers. Learn how to protect your work account and spot phishing scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to Do When Hackers Have Your Email Address\" \/>\n<meta property=\"og:description\" content=\"Seeing an influx of junk mail? Your email address might be in the hands of hackers. Learn how to protect your work account and spot phishing scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-21T02:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"What to Do When Hackers Have Your Email Address\",\"datePublished\":\"2026-04-21T02:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/\"},\"wordCount\":981,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg\",\"keywords\":[\"Email\",\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/\",\"url\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/\",\"name\":\"What to Do When Hackers Have Your Email Address\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg\",\"datePublished\":\"2026-04-21T02:00:00+00:00\",\"description\":\"Seeing an influx of junk mail? Your email address might be in the hands of hackers. Learn how to protect your work account and spot phishing scams.\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg\",\"width\":1200,\"height\":630,\"caption\":\"What to Do When Hackers Have Your Email Address\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to Do When Hackers Have Your Email Address\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to Do When Hackers Have Your Email Address","description":"Seeing an influx of junk mail? Your email address might be in the hands of hackers. Learn how to protect your work account and spot phishing scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/","og_locale":"en_US","og_type":"article","og_title":"What to Do When Hackers Have Your Email Address","og_description":"Seeing an influx of junk mail? Your email address might be in the hands of hackers. Learn how to protect your work account and spot phishing scams.","og_url":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2026-04-21T02:00:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"What to Do When Hackers Have Your Email Address","datePublished":"2026-04-21T02:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/"},"wordCount":981,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg","keywords":["Email","Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/","url":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/","name":"What to Do When Hackers Have Your Email Address","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg","datePublished":"2026-04-21T02:00:00+00:00","description":"Seeing an influx of junk mail? Your email address might be in the hands of hackers. Learn how to protect your work account and spot phishing scams.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-to-Do-When-Scammers-Have-Your-Email-Address.jpg","width":1200,"height":630,"caption":"What to Do When Hackers Have Your Email Address"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/what-to-do-when-hackers-have-your-email-address\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What to Do When Hackers Have Your Email Address"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=2771"}],"version-history":[{"count":2,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2771\/revisions"}],"predecessor-version":[{"id":2774,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2771\/revisions\/2774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/2772"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=2771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=2771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=2771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}