Here it is: Part two in our three part series on crypto security! From your privacy online, to cold-storage; here's how you can improve your security practices as we move through the year!
By keeping your information private, you can reduce the chances of being targeted by cyber criminals, scammers, and other malicious actors who may try to exploit your data or identity. There are some easy steps you can take to protect your privacy such as using an alias email, avoid using your cellphone number wherever possible, and not disclosing real names or addresses wherever possible.
If you have crypto that you do not need to touch, cold storage may be a good option to increase your security. With cold storage, the keys associated with your assets are kept offline in a secure environment, protected from malicious actors and other potential threats. This makes it virtually impossible for anyone to access the assets without physical access to the hardware, as well as the proper authentication process.
Planning for the future is important. It’s a good idea to share your backups with a trusted family member in the case of an emergency. This way you know you’ll be able to access your funds, even if you personally cannot. But remember, anyone with access to your seed phrase has full control over your wallet and the funds stored within.
Phishing is a type of cyber attack that attempts to steal sensitive information such as usernames, passwords, and credit card details by disguising itself as a trustworthy entity in an electronic communication. It typically involves sending deceptive emails or messages with links to malicious websites or attachments containing malware. Attackers often disguise the malicious links by pretending to be a legitimate source, such as a bank or wallet support.
This one is pretty self explanatory, but it’s important to take care of your electronic devices! Be mindful of who you give access to your devices, particularly those that have your crypto wallets.
Public WiFi networks are often unsecured and can be vulnerable to cyberattacks. These networks are also usually unencrypted, which makes it easier for hackers to intercept the data being transferred over them. As such, we would advise against using public Wifi to manage your crypto assets whenever possible.
It’s no secret that we’re safer when we look out for each other! By educating others, you stay vigilant yourself, and create a safer environment overall. A good way to help others learn would be to share this blog!
One of the most common ways people are targeted is via internet phishing attacks. A phishing attack involves an individual sending out a message that looks to be from a legitimate source in order to gain sensitive data such as passwords, credit card numbers, or other confidential information. Good hygiene means understanding how your behavior affects the chances of being targeted – this includes avoiding making purchases from unknown websites, keeping your software and devices up-to-date, and using a virtual private network (VPN).
Unsolicited messages often come from unknown senders and could contain malicious content such as malware, phishing attacks, or other malicious activities. Additionally, these messages may come from accounts pretending to be a known person. To protect yourself, never click on any links or attachments from these messages and be wary of opening DMs from unknown senders. If the message looks suspicious, the best course of action is to block the sender or delete the message.
Stay tuned for part three, the last blog in our series!