Werner van Rooyen
6 Oct 2018 &bull, Ten minute read
One of Bitcoin’s most significant features is that transactions aren’t reversible. This means that once you receive Bitcoin, you don’t have to worry about the sender reversing the transaction. But it also means that if your Bitcoin account gets compromised or hacked, they can send it off and you won’t be able to get it back again.
You should very first and foremost be sure to only overeenkomst with a reputable Bitcoin company and learn how to identify Bitcoin scams , but that is only half the equation.
It is crucial have your own security measures ter place to secure yourself from potential losses.
There are some basic private checks we’ll go overheen ter this article to greatly reduce the chances of your account from being compromised. They are:
- Securing your email account
- Securing your social media accounts
- Using unique, strong passwords for all online accounts
- Enabling two-factor authentication
Let’s go overheen them one by one.
If someone cracks into an unlocked house, takes the car keys from the kitchen toonbank and drive off with the stolen car, you surely can’t blame the car company for having a powerless security system! The car possessor has a feeble security system.
When people say that their accounts got “hacked”, what usually happened is simply that their email account got compromised, due to powerless security. Access to your email account talent hackers access to other accounts.
If someone has access to your email account, they can quickly search for a list of websites you have signed up for te the past. Then they can visit those sites, one by one, and request a password reset. When a password gets reset, a listig gets sent back to the inbox. After this, they may switch the email address te your accounts, fully locking you out of them.
And it snowballs. The more accounts of yours a hacker has compromised, the lighter it gets to compromise other accounts. Some accounts may voorstelling your account recovery questions and answers, like “Where were you born?” and “What is your mother’s maiden name” which may be required to build up access to another webpagina. Things can quickly spiral out of control.
How to secure your email account
1. Use a unique, strong password
I’ll go into this te more detail further down below, but it is crucial that you have a strong and unique password. If your password isn’t strong, it can lightly be guessed or cracked via brute force (where a laptop keeps attempting different password combinations). If your password isn’t unique and you used the same password on another webstek, a hacker can hack the other webpagina and get your password.
If you don’t have a unique, strong password for your email account, go switch it now.
Two. Check your latest login activity
Most reputable email providers permit you to see what devices and locations around the world recently accessed your email account. If you access your email account open on both your mobile device and your laptop, you should see numerous login sessions.
If you don’t recognise a login session by time, device or country, instantaneously sign out of all other sessions.
If you use a different email service, reach out to them to ask how to see latest account activity.
Trio. Review and eliminate email automaat forwarders
Most email accounts have a handy feature where you can automatically forward certain email types to another address. If you, for example, receive a monthly emailed invoice from the telephone company, your email provider can automatically forward a copy of that email to your spouse or your housemate.
The problem is, if a hacker got access to your email account at any time ter the past, they might have set up an auto-forwarder like the one above for specific sensitive emails (or worse yet: for all emails) to be forwarded on to them. Thesis emails can be stored overheen time and used ter many ways against you.
How to eliminate automaat forwarders
You can review things te Gmail by clicking Settings (the gear icon) >, Forwarding and Speelpop/IMAP.
If your email provider isn’t listed, go check ter the Settings section of your email account to see if there’s anything suspicious or voeling your email provider for more help.
Four. Review linked accounts
Email accounts have another useful feature that can be used for good and bad: linked email accounts.
Sometimes we’d like to stir on from foolish old email addresses, like [email protected], to something a little more professional like [email protected]. The problem is that wij don’t want to loom te and manage both or miss any emails still sent to the old address after switching to the fresh one.
Ter those instances, you can simply verbinding the two accounts. If you have access to both email accounts, you can loom into the fresh one, verbinding the old one and all emails sent to the old account will still arrive ter your fresh account.
You can event set it up that you can send emails from the fresh account using the other email address. This is fairly useful when you’re running a puny business, where you can send and receive individual emails (like [email protected]) and work emails (like [email protected]) ter the same inbox.
The problem is, again, if a hacker got access to your account at some stage ter the past and linked it to theirs, they can send and receive emails just like they are you.
How to liquidate linked accounts.
Check for suspicious accounts ter Gmail by clicking Settings (the gear icon) >, Accounts and Invoer.
If your email provider isn’t listed, reach out to them directly for more information on linked accounts.
Five. Set up two-factor authentication
I’ll go into more detail further down below, but two-factor authentication requires two things to build up access to your email account: something you know (your password) and something you have (your mobile phone).
It is almost unlikely for a stranger to build up access to your email account with two-factor authentication enabled.
Many people interact more frequently with social media platforms than they do with their email accounts. Many social media platforms, like Twitter and Facebook, permit you to authenticate and loom ter to other websites, without the need for a separate username/password.
It is of critical importance that you secure your social media accounts. The very first thing is to ensure a unique, strong password for all social media logins. Also, enable two-factor authentication, if it is available (more information on that further below). Lastly, have a look at sites and apps you have authorised and eliminate suspicious/inactive ones.
Authorising and revoking apps/accounts on Twitter
Loom ter, click on your picture and Settings and navigate to Apps.
How to keep your Facebook account secure
Facebook has some excellent resources on how to keep your account secure.
Go through the entire list, but pay special attention to the Passwords, Login approvals and Login alerts sections.
Why should passwords be unique?
Spil mentioned earlier, if you use the same password on two websites, you are already leaving yourself open to attack.
Wij sign up to hundreds of different online accounts on hundreds of different websites thesis days. Whereas you might trust Luno to keep your Bitcoin and information secure and not to store your password te an unencrypted form, not all websites have such high security.
It is, spil an example, very elementary for a hacker to set up a webstek promising you free Bitcoin, where you just need to inject an email address and password to get embarked. If you use the same email and password on all websites, that hacker now has your email address and password to all other accounts. Accounts that may contain sensitive information or Bitcoin.
Why should passwords be strong?
It is very ordinary for a hacker to crack a feeble password. If your password contains just a mix of numbers and normal words found te dictionaries, it can be quickly retrieved by brute force hacking (which just runs a combination of words and numbers one after the other).
Kaspersky Labs has a password check contraption that will tell you exactly how long it will take a hacker to brute-force crack your password.
Use a password management device
It is unreasonable to expect someone to reminisce hundreds of account passwords, especially strong ones. And writing down your passwords on a lump of paper or online document is certainly not a very secure solution.
At the very least, I suggest remembering your unique, secure password for all accounts that contain sensitive information, like your email and medical accounts, and money, like your Bitcoin and other financial accounts. That said, the easiest, most convenient and secure way is using a password management device instead.
What is a Password Management Implement?
Password management devices help you to store, organise and use all of your online passwords. They require you to create (and reminisce) a single, strong password, which gives you access to all your other passwords.
A loterijlot of people may ask “So what if the password manager instrument gets hacked?”. Which is somewhat fair and there is a possibility of it happening, albeit a puny one.
It’s significant to say that there is no such thing spil absolute security. The odds, however, if you are reusing passwords on numerous sites, permanently resetting passwords or using a list to store your passwords, that you are more at risk of being hacked than a password manager company getting hacked.
I’d rather trust a dedicated security company that specialises ter password management to treat it for mij than to rely on saved notes or worse yet: my memory.
Most password management implements also make logging te much swifter. Once you are logged te on your laptop, you can loom into websites with a few clicks (without typing out your utter email address and password each time). This alone can make your daily workflow much more efficient.
Suggested password management implements
We’re te no way affiliated with any of thesis password managers, it’s up to you to determine which ones have the right features for your needs. Be sure to always use a very strong (and unique) password for your password manager.