What to Do When Your Email Account Is Compromised: A Complete Guide

Steve Timmiss • October 28, 2025

Email compromise is one of the most common and damaging security incidents that businesses face today.

When a staff member's email account falls into the wrong hands, the consequences can be severe—from data breaches and financial fraud to reputational damage and loss of client trust.


At Kaizen IT, we've helped countless organisations respond to and recover from compromised email accounts. Through our experience, we've developed a helpful playbook that outlines exactly what to do when an email compromise occurs, helping you act quickly and effectively to minimise the damage.

Why email compromise is so dangerous

A compromised email account gives attackers a trusted voice within your organisation. They can:


  • Send convincing phishing emails to colleagues, clients, and partners
  • Access sensitive business information and confidential communications
  • Initiate fraudulent financial transactions
  • Compromise additional accounts and systems
  • Damage your organisation's reputation and client relationships



The average cost of an email compromise incident can run into tens of thousands of pounds, not to mention the time spent recovering and the potential legal implications under GDPR and other regulations.

Acting fast is critical

When you suspect an email account has been compromised, every minute counts. The faster you can contain the incident, reset credentials, and communicate with affected parties, the less damage the attackers can do.



However, in the heat of the moment, it's easy to miss critical steps or take actions in the wrong order. That's why having a clear, documented playbook is essential.

What's inside our compromised email playbook

Our playbook guides you through every stage of responding to an email compromise, including:


  • Immediate containment steps to stop the attacker's access
  • Investigation procedures to understand what happened and what data was accessed
  • Communication protocols for notifying staff, clients, and relevant authorities
  • Recovery processes to restore normal operations securely
  • Preventative measures to reduce the risk of future incidents


The playbook includes practical checklists and template communications to help you respond effectively even under pressure.

The Value of 24/7 Monitoring and Response

Whilst having a robust playbook is essential for responding to email compromise incidents, prevention and early detection are even better. This is where continuous monitoring becomes invaluable.


Kaizen IT's Blackpoint MDR (Managed Detection and Response) service provides round-the-clock monitoring of your systems through a dedicated Security Operations Centre (SOC). This means that suspicious activity—such as unusual login attempts, unexpected email forwarding rules, or abnormal data access—can be identified and addressed before a minor security event becomes a major incident.


Think of it as having a team of security experts watching over your IT infrastructure 24/7, ready to respond the moment something unusual happens. For many organisations, this level of proactive protection provides invaluable peace of mind and significantly reduces the risk of successful email compromise attacks.


If you'd like to learn more about how Blackpoint MDR could complement your existing security measures, our team would be happy to have a conversation about your specific requirements.

Don't wait until it's too late

Email compromise can happen to any organisation, regardless of size or sector. Having a response plan in place before an incident occurs can mean the difference between a minor inconvenience and a major business crisis.


Download our free Compromised Email Playbook today and ensure your team is prepared to respond effectively when every second counts.


If you'd like to discuss how Kaizen IT can help strengthen your email security or support you with incident response, get in touch with our team on 0345 141 1400 or hello@kaizenit.co.uk

By Steve Timmiss September 17, 2025
macOS Tahoe
By Steve Timmiss September 3, 2025
Why Cross-Platform IT Management Matters
DMARC email authentication image with padlock icons and compliance indicators for Microsoft, Google
By Steve Timmiss June 4, 2025
Microsoft joins Google & Yahoo in requiring DMARC authentication for bulk email senders. Learn how these new email security requirements impact your business and how to ensure compliance.
Modern device management dashboard showing connected devices, security indicators and remote tools.
By Steve Timmiss March 20, 2025
Discover how effective device management can transform your IT infrastructure. Learn about inventory tracking, software distribution, security compliance, and remote support for optimised business operations.
Rocket made of computer parts representing IT support accelerating business growth.
By Steve Timmiss January 28, 2025
Discover the 8 critical signs that indicate your scale-up business needs professional IT support. Learn how managed services can help overcome tech challenges and support sustainable growth.