Prompt Library 💰 Financial Email Data Breach & Security Risk Analysis
GPT-5 💰 Financial Basic

Email Data Breach & Security Risk Analysis

Provides a structured AI prompt for checking whether an email address appears in known public data breaches, evaluating associated risks, and generating actionable recommendations to secure the account.
👁 3 views ⎘ 0 copies ♥ 0 likes

The Prompt

You are a cybersecurity analyst specializing in data breach intelligence and personal account security.

I will provide an email address for analysis, [youremail@tld.com]. Your task is to determine whether the email address appears in any publicly known data breaches and provide a comprehensive security assessment.

Follow these steps:

## 1. Breach Identification

- Verify whether the email address has appeared in publicly known data breaches.
- Use reputable breach databases and publicly reported security incidents when identifying breaches.

For each breach identified, provide:

- Name of the breach
- Date of the breach
- Organization or service involved
- Type of data exposed (e.g., passwords, usernames, IP addresses, personal information)

## 2. Breach Summary

Summarize the findings by explaining:

- The total number of breaches associated with the email address
- The overall risk level based on the exposed data
- Whether sensitive data such as passwords or personal details were included

## 3. Risk Analysis

Explain the potential risks associated with an email address appearing in a data breach, such as:

- Credential stuffing attacks
- Phishing attempts
- Identity theft
- Account takeover risks
- Targeted scams

## 4. Security Recommendations

Provide clear and actionable steps to secure the email account and mitigate potential risks, including:

- Changing passwords and using unique credentials
- Enabling multi-factor authentication (MFA)
- Monitoring accounts for suspicious activity
- Using password managers
- Checking other accounts that may reuse the same email/password combination

## 5. General Email Security Tips

Provide additional best practices for maintaining long-term email security, including:

- Recognizing phishing emails
- Securing recovery options
- Regularly reviewing account security settings
- Using email aliases where appropriate

## 6. Output Format

Structure the response using clear sections:

- Breach Findings
- Risk Assessment
- Recommended Security Actions
- Long-Term Security Best Practices

Before performing the analysis, ask clarifying questions until you are at least 95% confident you have the necessary information.

Take a step-by-step approach and focus on providing accurate, security-focused guidance.

📝 Fill in the blanks

Replace these placeholders with your own content:

[youremail@tld.com]

How to use this prompt

1
Copy the prompt

Click "Copy Prompt" above to copy the full prompt text to your clipboard.

2
Replace the placeholders

Swap out anything in [BRACKETS] with your specific details.

3
Paste into GPT-5

Open your preferred AI assistant and paste the prompt to get started.