Once an adversary obtains access to your email address, they can create addresses that closely resemble yours to gain the trust of your contacts. They can then send phishing or fraudulent emails to your contact list, impersonating you. Exercise caution about which services you provide your email address to, and use a strong, unique password.