Funds diversification

By diversifying your funds across several exchanges and wallets you spread the risk, so if there is a breach of security in one of the locations you will protect the rest of your portfolio. The second thing that you should mind is the price fluctuation of cryptocurrencies – if one investment performs poorly, others may perform better over the same period. By spreading your portfolio in different projects you are reducing the potential losses from concentrating all your funds under one cryptocurrency.


Monitor your account activity

Enable account login notifications to prevent unauthorized access. If you suspect that your account have been breached, immediately freeze your account and contact Customer support. If you have any suspicions, it’s also a good practice to monitor your trading history for any unknown transactions.


Phishing scams

Phishing scams are a constant threat – using various social engineering scams, cyber criminals will attempt to trick you into providing personal information such as your usernames, passwords and other sensitive information gaining access to your funds. Phishing scams can be carried out by phone, text, or through social networking sites – but most commonly by email. Be suspicious of any email message or phone call that asks for personal or financial information. Here are some tips how to spot a phishing email: URL misrepresentation – Any links in a phishing email may appear valid, but in reality they can lead you to a replica website. When you hover the mouse over the link (without clicking it), you can discover in a small pop-up window that shows the actual URL. To avoid phishing scams always check the URL in your browser. Suspicious attachments – It would be highly unusual for a legitimate company to send you an email with an attachment, unless it’s a document you’ve requested. If you receive an email that looks in any way suspicious, do not download the attachment, it could be malware or a virus Take immediate action – this types of phishing email tries to trick you into clicking a link by claiming that your account has been closed or freezed, or that there’s been fraudulent activity requiring your immediate attention. Of course, it’s possible to receive a legitimate message informing you to take action on your account. To be safe, don’t click the link in the email, no matter how authentic it appears to be. Instead, log into the account directly by visiting the appropriate website, then check your account status.


Strong Passwords

Always use an unique strong password for cryptolyth and also for e-mail or social media accounts you use. Never use the same password twice. If another site gets hacked or has lower security standards, you don’t want your cryptolyth account to be at risk. Here is a tip what you should consider creating your unique strong password: Use at least 8 characters with small and big letters include digits and use at least one special character (eg. ! or @ or $) In addition, the password shouldn’t be similar to your name or login. Avoid using your birthday, pet’s name or anything that can be related to you. If you can’t memorize them all – use a password manager. A strong password is the first step to secure your accounts around the net! Use Two-Factor Authentication (2FA) Two-factor authentication is required in cryptolyth , in order to activate API trading for specific exchange. This ensures another level of protection for API keys with trading rights. By enabling (2FA) on your cryptolyth account, you are adding an extra layer of security to ensure that you’re the only person who can access your account, using devices you trust, like your smartphone, which is always by your side. This provides additional protection to your account if someone knows your password. We recommend you to use 2FA to keep other services secure, such as your registration email or social media accounts. When you enable 2FA, always save your recovery keys in password protected file or on an encrypted device hidden somewhere.


Secure Your Phone

Your phone is the key to your email and your 2FA, which are the two vital authentications. We recommend you to enable passcode lock, at least 6 digit pin. Enable erase-phone from your Apple or Android account, in case you lose the device. Don’t share your phone passcodes with anyone and change them if you have any suspicions.


Be careful what you click

Avoid visiting unknown websites and downloading software from untrusted sources. These sites often host malware that will automatically compromise your device. If attachments or links in email are unexpected or suspicious for any reason, don’t click or open them.


Never leave devices unattended

cryptolyth recommends that users should logout from the platform after each use, especially on untrusted devices. Each login session is retained for 30 days until the cookie expires. The physical security of your device is just as important as it’s technical security. If you need to leave your device unattended – lock it up so no one else can use it. If you keep sensitive information on a flash drive or external hard drive, make sure to keep these information encrypted or password protected.


Install anti-virus protection

Install an antivirus program only from a trusted source. Keep the software up to date to ensure maximum program effectiveness.


Back up your data

Back up your data on a regular basis. If you are a victim of a security incident, this is the only guaranteed way to repair your information.