Compromised devices can record everything you type, and mobile devices are the most common way to use two-factor authentication (2FA).
Don't share your devices. Don't share device access and passwords with friends and family just to make them feel comfortable, especially if you're using them for two-factor authentication.
Don't grant remote access. Some customer service teams will ask for remote access to your computer to help with technical issues, but this is extremely dangerous and a common tactic used by scammers. Therefore, always say "no" to apps like AnyDesk, TeamViewer, RemotePC, and GoToMyPC. The XCoin team will never ask you to install remote access software!
Avoid using public devices. Log in only from your personal devices.
Avoid using work devices to log into personal accounts. They can monitor and record your activity.
Protect your XCoin login
Never allow anyone to create or manage an account on your behalf.
Create a long password (at least 15 characters) that you don't use on any other websites.
Set up two-factor authentication (2FA) for login, preferably using multiple keys. This is the most important security feature. Furthermore, enabling two-factor authentication (2FA) for login triggers Step-up 2FA, an additional step required whenever you add, edit, or delete any 2FA settings in your account. If anyone requests changes to your XCoin account, you will be prompted to confirm your 2FA login again. This information must be entered correctly before any changes to your 2FA settings can be made.
Warning about 2FA backups: Improperly stored 2FA backups can backfire and lead to your 2FA being compromised. Warning about authentication apps that use cloud storage: If their cloud storage is hacked, your 2FA login settings may be compromised.
Beware that even two-factor authentication (2FA) won't protect your account if you enter it on a phishing site or share it with scammers.
Only use official XCoin websites. Third-party mobile apps that use the XCoin name or request your XCoin credentials are a form of phishing.
Comments
0 comments
Article is closed for comments.