Investing in and trading with cryptocurrencies has never been so popular as users feed back on receiving double, triple or even more on their original investments and the likes of Elon Musk continue to champion them. Meanwhile, the COVID-19 pandemic created a spike of interest on its own as governments seemingly push for a cashless society.
The stories are, indeed, true. Consider the example of Eddy Zillan who invested a few thousand dollars in crypto and became a millionaire. Naturally, people yearn for equal success. It comes as no surprise then that the crypto market gained 101 million users in 2020.
There are many opportunities to earn profits in the crypto market
But there are also scams and other security issues that have plagued the industry over the years.
In 2019, Bitrue, a Singapore-based crypto exchange platform was hacked for around $4.2 million worth of cryptocurrency assets. One phishing scam that went on for three years, starting in 2016, tricked many investors, and allegedly over $100million in cryptocurrency was stolen.
While there are still plenty of people who want to try their hand trading crypto, there are some who are hesitant simply because they are scared.
So, what can you do to avoid becoming a victim of scams and compromised security?
Top tips to help you secure your cryptocurrency
- Check your account activity
Have you made an audit of all your cryptocurrency wallets, logins, and other accounts that contain information related to your crypto assets? To start, check your email inbox so you can see which crypto platforms you signed up for. You can write these on a piece of paper or keep a record of it in a place that you think is most secure for you.
Knowing all your accounts will help you monitor the activities and act immediately should there be something suspicious going on. It is simple but effective.
- Check if an initial coin offering (ICO) is fake
Whilst investing and trading are different animals, ICOs cross into trader territory because marketing is directed at people with a little crypto experience. It is tempting to invest in an ICO that promises great technology and high ROI. But, this is where many rookie traders (and investors) get scammed. If you do not know the red flags, you could become part of the statistics.
Identifying fake ICOs:
Check the website’s team members. Look for any information about the founders and their staff. Investigate their activities on social media accounts. If you see that their number of likes and followers they accrued doesn’t match their account activity, then that is a red flag.
Read their whitepaper. Check if it contains reliable resources, a sound roadmap for implementation, and a well-researched financial model.
Ask for samples or code uploaded. If they cannot produce it, then no actual project or blockchain development is going on. You can hire a developer online to check it out if you do not have the skills yourself.
Make sure that the ICO developers have set up a legitimate escrow service to receive investments. Be wary of those who are receiving funds through a personal cryptocurrency wallet.
It is relatively easy to set up an ICO which is why scams have risen over the years.
The US Securities and Exchange Commission (USEC) even created a fake ICO to show investors the tell-tale signs of a fraudulent ICO.
When an offer seems too good, dig around for more information before making a move. If you are feeling FOMO through the marketing and not enough substance, walk away.
- Use 2-Factor Authentication (2FA) and Restrict Your API Keys
Two-factor authentication helps add a layer of security to your account. It is highly advised to not use the SMS 2FA as it can be intercepted. Rather, crypto enthusiasts suggest the Google Authenticator App because it can be used offline and it is local to your device.
If you are using a third-party software to help your trades, then it would be best if you place restrictions on your API keys so that it will only work with specific IP addresses. That way, you’re assured no one will be able to touch your account even if they manage to find your secret keys.
- Be aware of phishing scams
Hackers nowadays are smarter when it comes to phishing for information. This is why you need to be extra vigilant whenever you receive emails with external links. Often, these phishing emails are designed to look like a legitimate company and may be difficult to detect. Before clicking any external link or giving personal information, check the domain name. Legitimate companies use their domain name to send emails.
Hackers tend to use domain names that look almost similar to the company. For example, an email with the domain @coinbase.org is easily mistaken for @coinbase.com.
Also, if the email asks you to confirm personal information, be wary. Search for the organisation and contact them directly. Avoid engaging in any form of communication indicated in the email.
Be suspicious as well of any attachment in the email as it may be a malware. This is usually used by scammers to get into a computer and steal information.
Finally, do not send cryptocurrency to a wallet via email. ICOs and crypto exchange platforms will not ask you to transfer crypto using this method.
- Do not store all of your money in an exchange
Over the years, some crypto exchanges have become victims of hacking attacks and other security issues. This resulted in many of their user accounts being frozen or worse, compromised.
That is why there is no guarantee that your tokens can be safely stored in a crypto exchange platform. It should be stored in a private wallet.
There are four different types of wallets: paper wallet, hot wallet, mobile wallets, and cold wallets.
In the crypto world, it is highly recommended to have a cold wallet, also known as a hardware wallet. It has a Secure Element (SE) chip to secure your keys in an offline device.
Since it is offline, your information is less vulnerable to potential hacks.
Plus, the microprocessor embedded in the device remains offline even when connected to the internet. This means that even if the computer has malware, your private keys will not be compromised.
- Use software to hide your digital footprint
A digital footprint pertains to all the traces of your online activity. This includes your social media posts, comments, cookies, IP address, and login details.
Hackers can use these traces to access your personal information. You do not want this to happen and risk compromising the security of your crypto assets.
That is why it is recommended to use a Virtual Private Network (VPN) to hide your identity while browsing and keep your online activities away from prying eyes.
All you need is to download a reputable VPN program, install it on your device, and run it. With this, you are making yourself much more invisible online, encrypting your data, and masking your IP address.
When you leave your house, do you leave the doors unlocked? No. The same goes for your financial assets. Simple steps to take such as keeping your crypto in a cold wallet, leaving only your trading balance on the exchange, and regularly doing account audits will help you become more secure in the world of crypto.