Data breaches have become so frequent that security researchers estimate the average person's email address appears in at least five breach databases. With billions of records exposed annually, checking whether your personal information has been compromised is no longer optional; it is an essential part of digital hygiene. The good news is that several free, reputable tools make this process straightforward.
Have I Been Pwned: The Essential First Check
Have I Been Pwned, created by security researcher Troy Hunt, remains the most comprehensive and trusted breach notification service. Simply enter your email address at haveibeenpwned.com, and the service will show which known breaches include your information. The database contains over 14 billion compromised accounts from more than 800 breaches.
The site also offers a free notification service that alerts you whenever your email address appears in a newly disclosed breach. This proactive monitoring ensures you learn about new exposures quickly rather than discovering them months or years later. The service is privacy-respecting and does not store or share your email address beyond its notification function.
Google Password Checkup
Google's Password Checkup tool, available through your Google Account settings or the Chrome browser, automatically checks your saved passwords against known breach databases. It identifies passwords that have been exposed, passwords that are reused across multiple sites, and weak passwords that should be strengthened. The checks happen locally using encrypted comparison, meaning Google never sees your actual passwords during the process.
For Chrome users, the Password Checkup feature runs continuously in the background and provides real-time warnings when you enter credentials that match known compromised data. This passive monitoring provides an additional layer of protection without requiring active effort from the user.
Mozilla Monitor
Mozilla Monitor, formerly Firefox Monitor, provides breach checking integrated with the Firefox browser ecosystem. Like Have I Been Pwned, which powers its underlying data, it allows you to check email addresses against known breaches. The service sends monthly summary reports of your exposure status and provides actionable recommendations for each breach.
Mozilla Monitor's interface is particularly user-friendly, presenting breach information in a clear, non-technical format that makes it easy to understand what was exposed and what steps to take. The service also provides a dashboard view that shows your overall exposure level and tracks your progress in resolving identified issues.
Checking Beyond Email
Email-focused tools catch many breaches, but some exposed data is not tied to email addresses. For phone number exposure, services like SpyCloud and Intelligence X allow searches for phone numbers, though some features require paid subscriptions. Social Security number monitoring is available through the major credit bureaus' free annual credit report service at annualcreditreport.com.
For a more comprehensive view of your digital footprint, identity monitoring services like those offered by credit bureaus scan dark web markets and forums for your personal information. While many of these services require a subscription, the basic monitoring features offered by Equifax, Experian, and TransUnion are available at no cost and provide alerts when your information appears in new contexts.
What to Do When You Find a Breach
Discovering that your data has been breached requires prompt action. For each affected account, change your password immediately and ensure the new password is unique and strong. If the breached site shares a password with other accounts, change those as well. Enable two-factor authentication wherever available, preferably using an authenticator app rather than SMS-based codes.
For breaches that include financial information, monitor your bank and credit card statements closely for unauthorized transactions. Consider placing a credit freeze with all three major credit bureaus, which prevents new accounts from being opened in your name without your explicit authorization. Credit freezes are free and can be temporarily lifted when you legitimately need to apply for credit.
Building Ongoing Protection
Regular breach checking should be part of a broader personal security strategy. Use a password manager to generate and store unique passwords for every account. Enable two-factor authentication on all accounts that support it, prioritizing email, financial, and social media accounts. Keep software and operating systems updated to protect against known vulnerabilities.
Consider using email aliasing services that create unique addresses for each online account. This approach makes it easier to identify which service was breached when you receive notification, and allows you to disable compromised addresses without affecting your primary email. Services like SimpleLogin and Apple's Hide My Email provide this functionality at low or no cost.