What are some things I can do to keep my account safe?

Please be be cautious with all outside resources as we are providing suggestions and are not liable for the personal decision to use the suggestions at your own risk. 

 

Password Security | Account Verification Security | Web Browser Safety | Email Security | General

 

Password security

Some of the most skilled developers use password managers. Password managers provide an extra layer of security and verifications to slow down hackers from getting into your accounts. A few reputable services to keep your accounts from external harm include but are not limited to: KeePassXC,  Bitwarden, Keeper, and LastPass .

  • Refrain from using the same password too many times or on multiple sites. You want to make sure that all of your passwords are unique and have multiple different characters. 

  • Using a secure password keeper/generator will help you keep all of your passwords separate and extremely unique since they let you choose what types of characters you would like to include in your password. 

  • Avoid using sensitive and personal information like birthdays, family names, social security/ social insurance numbers, and any unique government IDs as well. 

 

Account verification security

Two-factor authentication is an important step to take to protect your important accounts whenever possible. It may seem like a pain at times to enter that extra code—which you may only have to do once
per device or once every 30 days—but it’s a price worth paying to make your online accounts more secure.

 

The basic idea is that a single password for your important accounts simply isn’t enough. If your password is guessed, or hackers steal a database with your login information in plain text, your account is a sitting duck. Two-factor authentication attempts to address flaws by requiring a secondary code called a one-time password (OTP)—usually six characters in length and generated by a smartphone app—before you can gain access to your account. In the event a hacker gains access to your password, they’ll still need to crack a secondary code, making the dark process more difficult.

Reputable applications include but are not limited to: Google Authenticator, Microsoft Authenticator, MyKi, and Authy

 

Web browser safety

 

Exploiting email and web browsing applications is the most common way hackers and malware try to gain access to devices and your information.

Protect yourself before you start browsing the web by making sure that your operating system, web browser, security software, browser plugins (like Java or Adobe products) and other applications are up-to-date.

Here are just a few ways you can help keep yourself safe when browsing the internet. 

  • Use strong unique passwords online. 
  • Only download files and applications from websites that you trust, such as from official app stores or legitimate organizations, such as your bank.
  • Pause and think carefully before clicking on links in email, messages or on social networking sites. Don’t click on links in messages if you don’t know the sender or if the message is unexpected.
  • If you think a link looks suspicious or you can’t tell where it leads, before you click hover over that link to see the actual web address it will take you to (usually shown at the bottom of the browser window). If you do not recognize or trust the address, try searching for relevant key terms in a web browser. This way you can find the article, video, or webpage without directly clicking on the suspicious link.
  • Expand shortened URLS to check if they are safe. Short URLs are often used in social media. There are a number of services that create short links - such as goo.gl, bit.ly, tinyurl.com, ow.ly and youtu.be. To check if these links are safe you can use an ‘expand link’ facility to get the original URL from a shortened link without having to click through to the destination. Look for a short URL expander that is recommended by your anti-virus software or a reputable software company.
  • Be wary of offers that seem too good to be true. Leave websites that ask for your personal or banking details in return for money – these are scams. Remember, if it seems too good to be true, it probably is.
  • Don’t agree to friend requests from people you don’t know on social media networks - people are not always who they say they are.

 

Other forms of security can be web browser plug ins that help keep your browsing safe and monitored. 

 

Email security

 

The last thing you want is to have your email address hacked, especially if you own crypto-currencies. Someone could reset your passwords on different exchanges, use it to make withdrawals or even to allow his IP address on your account.

  • Make sure the email you're using has been made exclusively for crypto-currencies and exchanges accounts. Don't set your primary email as a recovery email.

  • Enable 2FA on your email address too.

  • Consider creating more than one email dedicated to crypto, if you have one address per exchange your chances of losing it all will be reduced. 

  • Don't stay connected to that email account (especially on your phone) and only login from trusted WiFis.

 

General 

 

Security guide regarding bots:

Bots are amazing, they can trade 24/7, will never lose their attention and will always stick to the strategy they've been made for. We all agree on that, but you must be very careful.

  • Third-party websites: if you look for "crypto-currency trading bot" on any search engine, you'll find tons of websites that give you access to bots, promises of extraordinary returns, "very secure" as you don't give them your account credentials but just your API keys in writing mode etc.

  • If someone has a printing machine that lets you make x% per day, they wouldn't be selling it, they wouldn't be allowing you to use it for free or even for a fee, they would just use it. If you made a bot that can make 50%+ per year, without any risk, it wouldn't be very hard to find enough money to use it for yourself, right ? If something is too good to be true, don't fall for it. Sometimes the trick is to make the customer pay for the service, he thinks "this is how they make money" when it's not.

  • The general rule in those cases is don't give your API keys if you wouldn't send your crypto-currencies to that website/people, because it's exactly what you're doing, putting your crypto into their hands. Don't do it until you trust them enough to give them your coins.

 

Other general guides:

  • If you don't understand what you're doing, stop what you're doing and take the time to understand before continuing.
  • If you plan to hold your crypto-currencies for more than a few hours/days, purchase a hard wallet to store your currencies. (do not purchase a digital wallet from a website other than its Official
    Website).
  • Don't share too many personal details, the less the better, and don't tell everyone how much of a crypto-currency you're holding.
Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.