Share
Explore
download-2
Click here to the PDF version
high-priority

Your Crypto Assets Could Be At Risk Are You Prepared?

Since 2011 over $1.65 Billion of cryptocurrency has been stolen through hacks and frauds.
These figures aren't just numbers, they represent real losses for investors and platforms alike.
The PHISH Checklist is your first line of defense, offering you the essential tools and knowledge to safeguard your digital assets.

Private Keys

Private keys are like the password to your cryptocurrency wallet. They are essential for accessing and managing your crypto assets. Keeping them secure is crucial because anyone with access to your private keys can control your cryptocurrency.
Obtain your first set of private keys by setting up a free digital crypto wallet such as or
Write down your private keys in a paper notebook & never share all of the private key words with anyone
Back up your private keys in multiple locations

Hardwallet

A hardware wallet, more commonly referred to as “hardwallet”, is a physical device that stores your cryptocurrency offline. It's considered one of the safest ways to store crypto because it reduces the risk of online hacking, as the assets are stored away from an internet connection.
Invest in a reputable hardwallet such as or
Store your hardware wallet in a secure location
Regularly update the firmware of your hardware wallet

I.P. Address Disguise

Masking or disguising your I.P. address adds an extra layer of privacy and security. This can be achieved through the use of a Virtual Private Network (VPN) software. It helps in preventing hackers from tracing your internet activity and protects against potential targeted attacks.
Use a VPN when dealing with cryptocurrencies such as or
Set the VPN location to a crypto friendly country & regularly change this location
Avoid public Wi-Fi for transactions

Software Antivirus

Antivirus software helps protect your computer and other devices from malicious software and cyber attacks. For crypto users, it's vital to have strong antivirus protection to prevent malware that could steal private keys or wallet information.
Install reliable antivirus software such as
Keep your software updated
Regularly scan your devices for malware

Hygiene

In the context of cryptocurrency, 'hygiene' refers to maintaining good digital practices. This includes regularly updating software, being cautious about phishing attempts, using strong and unique passwords, and generally being vigilant about your digital footprint and security.
Regularly update all software related to your crypto activities
Always read the full email address of the sender, specially emails from crypto exchanges/wallets (be cautious when interacting with images & links)
Use strong, unique passwords for different accounts

filled-flag

NEXT STEPS

Have questions or need help? Join our FREE community, , where hundreds of like minded crypto, NFT, and digital asset enthusiast gather

Want more detailed information and step-by-step instructions on the topics above? Download our FREE e-book,

Follow us on Social Media

Disclaimer: Please note that the information provided in "The PHISH Checklist" is for educational purposes only and should not be construed as financial advice. The creators and distributors of this checklist are not financial advisors. We do not assume responsibility for the security of your funds or any financial decisions made as a result of using this checklist. Users are advised to conduct their own research and exercise due diligence in all cryptocurrency-related activities. Additionally, this checklist may contain affiliate links, through which we may earn a commission at no extra cost to you. This helps support our educational content, allowing us to continue providing valuable insights into the world of cryptocurrency.

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.