If you’re unfamiliar with the crypto world, it can certainly seem like investing in cryptocurrency puts you at a higher risk of getting hacked and having your money stolen. When you consider that the cryptocurrency world is still unregulated, it can seem like it’s difficult to practice safe crypto investing and protect your investments from thieves. 

After all, major scams make the news all the time, such as hackers stealing $196 million worth of crypto from the BitMart exchange in December 2021, or when the Poly Network exchange was hacked and thieves made off with $600 million worth of crypto.

However, it’s important to keep in mind that blockchain technology itself is incredibly secure and resistant to attacks. While hacks and scams certainly do happen, if you take certain precautions and do your research before investing in crypto or joining a particular exchange, then you can help lower your risk of becoming a victim of an attack.

1. Install antivirus software 

A basic security measure that you probably already do is to have antivirus software installed on all your devices. This will help protect you from any malware that could be hiding behind things that you download to your computer. 

Even if you’re downloading something from a legitimate company’s website, it’s still possible for malware to be hiding within it. In addition, antivirus software can help protect you in the event you accidentally click on any phishing links in your email.

2. Use a virtual private network

crypto person typing in front of two laptops for decentral publishingUse a virtual private network (VPN) to help you maintain data security and privacy online, especially when you’re on a public WiFi network. Without a VPN, potential hackers can gain access to your data and browsing habits. 

So if you’re making crypto transactions on an unsecured, public WiFi network, you risk having this data exposed. 

A VPN works by masking your device’s IP address so that your internet connection is secure and your browsing and online movements can’t be tracked by thieves.

3. Never click on links in your email, even if they appear to be legitimate

Social engineering scams are different scams where the hackers pose as legitimate representatives from an official company and ask for your personal information. Phishing is just one type of social engineering scam. 

While you probably already know not to click on any links you find in suspicious-looking emails or text messages, the social engineering scams used by cybercriminals today can be much more complex. 

For example, say you keep your crypto on an exchange. It’s entirely possible for a criminal to “spoof” the company’s actual email address, send you a link asking you to log in to your account, and then spoof the actual website and login page. 

The spoofing could look so real that there is no way to tell the difference between the fake website and the real one. And once you enter your account information, your crypto is pretty much gone. 

Not to mention, if you use your email address as your login, then the hackers can use that to get access to other accounts as well.

So what do you do in this scenario? The best thing to do is NOT click on any links sent over email, even if they appear to be from the actual company. Instead, go directly to the company site and log in from there.

4. Use a password generator

The next tip for safe crypto investing is also another obvious safety measure: don’t reuse your passwords! And more importantly, when creating a new password for your account on a crypto exchange, use a password generator to make sure your password is sufficiently complex, with letters, numbers, and special characters.

5. Use two-factor authentication

crypto smart phone with a security badge on the front for decentral publishingThe next layer of security after your password is making sure you have two-factor authentication (2FA), or even multi-factor authentication (MFA). However, SMS 2FA—the kind that sends a text message to your cell phone with the code—is not sufficient and can leave you vulnerable to attack. The same goes for email.

Instead, the next best option is to use an authentication app, such as Google Authenticator. Even better, if you want the ultimate level of protection you can purchase a hardware authentication device. Because this device is offline, there is no way for the code to be stolen.

6. Take your crypto off of exchanges! 

Any crypto enthusiast will likely tell you: take your coins off of exchanges if you want to minimize the risk of crypto theft! And if you have a large investment, you should definitely take this advice. 

There are many options for software (hot) and hardware (cold) wallets. Software wallets can be used on your desktop or as an app on your mobile device. Many of them typically have built-in exchanges and allow for staking and other rewards opportunities. However, they come with their own fees.

For the ultimate protection, a hardware wallet will be your best bet. These are offline, physical devices that store your crypto more securely than any online option. 

But even still, there are extra measures for safe crypto investing you should follow to make sure you’re protecting your hardware wallet, which we’ll get into next!

7. Use multiple wallets and exchanges

crypto hard wallets one of which is a flash drive for decentral publishingYou’ve probably heard you shouldn’t keep all your eggs in one basket when it comes to diversifying your investment portfolio. However, the same holds true for where you keep those investments. 

For the ultimate protection, spread out your investments across multiple wallets and/or exchanges. This way, if one ends up compromised, the rest of your investments will still be safe.

8. Keep your private key and recovery phrase non-digital

Ok, so what keeps hardware wallets from being completely hack-proof? If you have an offline device, what more could you need to do to ensure you’re practicing safe crypto investing?

Well, when you open a wallet, whether hot or cold, you will be given a private key and recovery phrase (also known as a recovery seed). 

It’s critical that you don’t lose either of these because you will need them in the event you lose your wallet. So if your wallet ends up stolen, your crypto will still be safe because hackers won’t be able to do anything without the private key or recovery phrase.

So, what’s the problem with this? Most people find it convenient to take a photo of their private key and recovery phrase and store it on their device for quick access, or even store it in a text file.

So if hackers get access to your device, for example through a SIM swap, then they can access this photo and then use the information to get into your hardware wallet. When that happens, your crypto is as good as gone.

And even if you delete the photo from your device, it can still make it to your cloud storage, which hackers would also have access to in a SIM swap. We’ll get more into what a SIM swap is next.

For this reason, you should only ever write down this crucial information and keep it as a hard copy—no digital versions at all. And then, keep that hardcopy in a secure location where you won’t lose or forget it.

9. Use fake phone numbers to avoid SIM card swapping

crypto unknown man in hoodie in front of a laptop with a matrix style dark background for decentral publishingSo, what is SIM card swapping? This scam involves criminals gathering as much information as they can on you, whether through phishing or just researching you online, and then approaching your mobile carrier and posing as you to ask for a new SIM card or help switching to a new mobile device. 

If they successfully do this, then they control your phone number on their own device. This effectively gives them access to all of your accounts, because from there they can reset your passwords, take over your 2FA apps, and lock you out of your accounts.

The solution to preventing this kind of crypto theft is to keep your mobile carrier number separate, and instead use fake phone numbers and fake email addresses when setting up your crypto exchanges, wallets, and authentication apps. There are plenty of apps out there that can help you get fake numbers to use.

What does the future of safe crypto investing look like?

crypto matrix style cryptography with a blue lock on the background for decentral publishingIn 2020, the Ledger hardware wallet suffered an attack from thieves who stole their customers’ data. While the customers’ crypto and wallets remained safe, the hackers made off with their addresses and shipping information.

This only goes to show that you should never assume you’re completely safe from hackers, because even crypto exchanges and wallets have work to do to make sure they protect their customers’ data. 

You should always make sure you’re doing all that you can to protect your investments, including researching the reputation of the exchange or wallet you’re considering using.

As the crypto market continues to grow and more people become interested in investing, hackers will keep trying to target those who don’t have a good understanding of cryptocurrency. Use these nine security and authentication tips to help you practice safe crypto investing and avoid becoming a victim of crypto theft.