10 Easy Steps to Secure your Cryptocurrency Now!

Key Steps to Protect Your Crypto

While some in cryptocurrency use a Trezor or Ledger, as “cold storage” hardware wallets, there are other easy steps to wrap more security around our crypto holdings.

In this article, I explore simple yet powerful steps to bolster security firewalls.

1. ProtonMail

What’s not to love about Protonmail?

Based in Switzerland, Protonmail is an end-to-end encrypted webmail service, giving the user “shielded” email protection.

Using encrypted email is important, as emails can come as password resets, confirmations, and other highly sensitive information to keep away from others.

2. Enable 2 Factor Authentication (2FA)

Many neglect to take the time to establish 2FA across all of their accounts for enhanced security.

While I am not a tech expert, many tech experts are increasingly advising clients to switch from Google to 2FA to biometric alternatives, such as Lastpass or Microsoft.

This means not only is a 2FA code needed for account access, but also your personal fingerprint.

3. Biometrics or Yubikey

Biometrics, such as a fingerprint, enhance security and ease of user experience.

Many feel even more comfortable with a hardware device such as Yubikey, requiring physical contact for account access.

For this reason, using a Yubikey can further increase security.

4. Encrypted Computer Folder (Cryptomator)

As many will put their private files, such as their personal identification and account seeds, into a physical lockbox, an alternative is an encrypted folder.

Much like using Protonmail to encrypt your email, an encrypted computer folder is a folder with files that only you can read, meaning data remains secure even in a hack.

Cryptopmator is my favorite encrypted folder service.

5. Protect Your Devices with Next DNS

Next DNS is a newer service that blocks ads, trackers, and malicious websites across all your devices.

Giving you back control over your privacy, and moving us beyond censorship, we feel everyone in the crypto space should look into Next DNS.

With Next DNS you “whitelist,” adding the sites your system may access, paving the way for a much safer internet.

6. Earn BAT and PRE tokens with Brave Browser and Presearch Search Engine

The decentralized Brave browser keeps your devices running fast, clean, and free of much of the harmful internet trash.

If you’re in cryptocurrency, we strongly believe in decentralized alternatives.

Also, consider supporting decentralized web searches by downloading the Presearch Search Engine.

7. Password Manager (Keepass or Lastpass)

Using long random password manager-generated random passwords is a critical security step.

Experts seem to say a minimum of 30 random characters should be sufficient, as Keepass and Lastpass allow the use of up to 100 characters.

Keepass and Lastpass also allow for team sharing of individual passwords and password folders.

8. Do Not Port Cell Phone Number

One scam on the rise is “SIM porting”, wherein a hacker gaining personal data access, contacts your mobile phone carrier, demanding they port your number to them.

“Yeah. NOT good.” But there is a solution, your mobile phone provider does not tell you about.

You can speak to their fraud department, add a verbal pin number, and move your number to “DO NOT PORT” status.

9. VPN (Mullvad VPN)

A VPN is essential for a safe internet, and even more so in the crypto world.

My favorite VPN is easy to use and secure Mullvad VPN, with a built-in kill switch and double-ended protection.

Mullvad VPN can automatically move you amongst multiple locations for enhanced security.

10. Whitelisting Your Crypto Addresses

Whitelisting involves limiting where your tokens may be transferred.

For example, if you have a Coinbase and Binance account, and you hold only ETH and BTC, you’d enter only these as authorized addresses for external transfers.

This can powerfully lockdown and take control of external asset transfers to protect against both theft and user error.

Final Conclusions

I want to know what YOU think.

What did I miss for security essentials?

What is your favorite essential security item?

Your Friends in Prosperity,

Ross Jones

Disclosure/Disclaimer: This article is not an offer to provide financial, legal, or tax advice. This article represents an opinion, as you should not rely upon this subjective opinion, instead of your own independent research. All investments pose the risk of loss to the investor, with any investment posing up to 100% loss of investment. Always consult your financial, legal, and tax advisor prior to engaging in any investment. Always do your own research and invest at your own risk with complete awareness and acceptance of all risks. I am choosing to disclose that I have a financial interest in all tokens discussed in my articles.

--

--

Leading Web3 Growth Strategies and Systems

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store