Company updates Education

8 non-trivial crypto security tips

, January 15, 2021

Cryptocurrencies and blockchain technology offer a secure way to conduct financial transactions. However, cybercrime is rampant in the digital world. Here are some non-trivial security tips to help protect your digital assets and not fall victim to money scams.

📌 1. Use Password Generators

Passwords that consist of numbers or a single word are easily guessed. Using your date of birth or name and surname combination as a password simply invites scammers to your account. Better use a password generator and use strong passwords of a random set of symbols. The more complex the password combination is, the more secure it is. Oh, and keep your credentials safe (don’t write them down on paper, come on).

📌 2. Use Google Authenticator for 2FA

Or any other authentication app. First — because it’s easier than SMS/calls to your phone number and doesn’t require a good network connection. Second —  this method is considered more secure since there are SIM swaps and other phone number-based hacks. 

Just note, when using Google-based 2FA, you need to save your backup code. It will help you restore access to your account if you accidentally delete the Google app from your device or got a new smartphone. In case you have a phone-based 2FA method and have changed your phone number, recovering access to your account will take more time and effort.

📌 3. Regularly monitor your trading and withdrawal history

You can track your transactions manually or with some dedicated monitoring tool or at least keep an eye on your inbox. At CEX.IO, you’ll receive an email upon performing transactions in your account. Any transaction that is not requested by you is a signal of unauthorized activity on your account.

📌 4. Prefer cold crypto wallets

Offline devices like USB wallets keep your crypto away from online hackers. It’s also a good idea to have several wallets so as not to keep all your eggs in a single basket.

When choosing a crypto service, make sure they use cold wallets. CEX.IO uses cold storage for users’ funds, so you can be sure we keep your funds safe.

📌 5. Delete all remote-access software

Did you know that many remote-access services have numerous security holes? It doesn’t take much Googling to find such stories. Even if you have 2FA enabled on your accounts, remote-access software can give attackers access to your computer with just a string of symbols. So better play it safe and don’t keep any applications that can give a remote access to your computer at the same devices where you use your crypto wallets and exchange accounts.

📌 6. Triple-check when sending crypto

Crypto wallet addresses are a long mix of digits and letters, so never type them manually, only copy and paste. And check at least the first and the last few symbols to make sure they are correct. Some malware can replace the copied addresses with the one that belongs to the hackers. Be smarter than them — carefully check wallet addresses.

📌 7. Keep your mouth shut.

Avoid talking about the details of your trades, investments, or crypto portfolio anywhere, especially online. Social media are full of scammers hunting for potential victims with their pockets full of money (that’s exactly how scammers see users). If you raise any questions about your trading or show your interest in crypto, the scammers will attack you with their “sweet” offers to help or double your profits. You don’t want to be their victim, do you?

📌 8. Avoid public WiFi-s.

Their hosts can set up their own rules that you will never be aware of (they may redirect your browser to phishing sites, collect your passwords, so on). If there is a dire need to access your crypto funds from public WiFi, at least use a secure VPN to ensure that your online activities and sensitive information are protected from prying eyes.”. 

🙌 Stay alert and read more security tips and updates about CEX.IO in our Telegram channels: 

English: https://t.me/CEX_IO

Russian: https://t.me/CEXIORU

Related

CEX.IO News Education

7 most common crypto scams: what they are and how to avoid them

Learn about the most popular cryptocurrency scams, how to identify them, and better protect your holdings. Stay safe!

Nov 17, 2020 | 15 min read
Company updates

Important Information Regarding Signature Bank Closure

We understand that you may have concerns about shutdown of Signature Bank. We’d like to reassure you that all funds held with CEX.IO are safe. No dollars were lost as the result of this event. 

Mar 13, 2023 | 2 min read
CEX.IO News Education

What is a Coinbase Transaction?

All transactions on the bitcoin network are not created equally. A coinbase transaction is a unique type of bitcoin transaction that can only be created by a miner. This type of transaction has no inputs, and there is one created with each new block that is mined on the

Oct 29, 2014 | 3 min read