Use a password manager for a unique strong password, activate 2FA (preferably a security key), and check OAuth tokens for apps you’ve granted access. If the breach exposed login credentials, these measures block lateral entry. Google’s Security Checkup is more than just reassurance it lists critical red flags.