Step 3: Secure Your Devices💻📱
Before you start setting up your crypto exchange accounts, emails, username, password and hardware wallet, you need to ensure that your devices – such as your phone, laptop, tablet or any connected devices you will be using to buy any cryptocurrencies is safe, secure, and free of any malware.
First, require a long, complex, hard-to-get password for your laptop. Make sure you use upper case, lower case, numbers and special characters. I recommend 16 to 24 character passwords.
Now, document this long password for your laptop into your notepad. Make sure you title it. For example, password for laptop. You have to keep the instructions in your notepad easy to read and understand, legible and detailed that a 5-year old will understand.
Next make sure your phone, tablet and any other connected devices for crypto investing are passworded and document these details in your notepad. Alternatively, ensure your phone can only be accessed using your fingerprint or facial recognition.
- Scan & Protect Your Devices
Next, you need to do a full and complete malware scan of your laptop, phone and tablets. I use Malwarebytes to scan, clean and protect my laptop and phone.
To download Malwarebyte, click here
Make sure you do a complete scan and once the scan is complete and your laptop is clean. Congratulations! If threats were discovered, click on the quarantine tab and click clear quarantine.
Malwarebyte has both the free and premium version as needed.
- Encrypt Everything You Type
Next, download KeyScrambler. This is free to use. This prevents your computer or hackers from recording your username, password or email to hack into your account. So the way KeyScambler works is that it encrypts everything you type on your computer real time. I recommend Keyscrambler by QFX
Alternatively, if your computer has an on-screen keyboard, you can also type out your password and any sensitive data using only the on-screen keyboard. This also prevents keystroke loggers from recording and storing any of your vital and sensitive information such as password and username.
- Never Publish Your Cell Phone Number Online
Never publish your cell phone number online. Remove it from public websites and forums as with your phone number, you can gain access to a lot of sensitive and private information. We use our phone numbers to access our banking, investments, school and a host of information.
Hackers can steal your phone identity by what is called SIM Card Theft. Hackers can call your cell phone provider and request a new SIM card. With this new sim card, they can have access to your banking and investment accounts and drain your hard-earned money and investment.
And you wont realize this until you discover you aren’t receiving any calls or text or notifications on your phone. It’s advisable to set up a strong passcode with your cell phone provider that anyone requesting for any information about your account needs to provide before gaining access or activating any sim card.
Once you set up the passcode with your cell phone provider, document it in your notepads. You can also change the passphrase as often as needed.