Access
Confirm you can still sign in and reach recovery email.
Regain account access, rotate credentials, revoke sessions, preserve evidence, and rebuild secure defaults after a scare.
Recovery is a sequence, not a scramble. Keep access alive, lock out unknown sessions, change the right secrets, then document what happened so the same door does not reopen.
How to approach it: Do not start by deleting everything. Start by preserving access and closing active risk.
Security software should make the boring moves easier: stronger sign-ins, cleaner permissions, visible scans, safer recovery, and defaults that prevent the dramatic cleanup later.
Confirm you can still sign in and reach recovery email.
Log out unknown devices and revoke app access.
Rotate passwords, tokens, backup codes, and passkeys.
Check forwarding, payment settings, messages, and recovery options.
Start with the tool closest to the task, then move sideways when the file, account, setting, or handoff changes.
Use this when recover is the next thing that has to work.
Use this when recover is the next thing that has to work.
Use this when recover is the next thing that has to work.
Use this when recover is the next thing that has to work.
Use this when recover is the next thing that has to work.
Use this when recover is the next thing that has to work.
Confirm you can still sign in and reach recovery email.
Log out unknown devices and revoke app access.
Rotate passwords, tokens, backup codes, and passkeys.
Check forwarding, payment settings, messages, and recovery options.
Three fast entry points for the most common version of this job.
A clean first guide for recover in the Security lane.
A clean first guide for recover in the Security lane.
A clean first guide for recover in the Security lane.
Practical answers for the decisions people make before changing settings, sharing files, or resetting the tool.