XS2 is designed from the ground up to keep your deposited cryptocurrencies and personal data safe from hackers and other criminals. It is still important to take your own responsibility to protect your online safety with steps apropriate for you. The tips below should be considered by everyone.


Passwords

  • Use strong passwords (many characters, mix of character types, numbers, letters, capitals and lower case etc)
  • Don’t use obvious passwords, (like your name, your address, 1234 etc) and change your password regularly.  Use different passwords for different services— use a password service such as LastPass to manage your passwords.
  • Protect your Wi-Fi service with an encrypted password.  


Other services

  • Don’t link accounts. If you want to comment on an article and you’re prompted to sign in with Twitter or Facebook, don’t do it. Linking accounts allows services to acquire information about you that you don’t intend to share.
  • Do not use open Wi-Fi; it makes it too easy for hackers to steal your connection and download illegal files or other data. 
  • Keep sensitive data off the cloud as information stored on the Cloud doesn’t belong to you.
  • All online services collect information about you, only give your personal information to businesses with a good reputation for respecting your information.


Your system and other hardware

  • Lock your computer/phone when not in use and make the timeout short. Use fingerprint lock for the iPhone and passkey or swipe for Android
  • Update your OS and other software frequently, (may be done automatically). This keeps hackers from accessing your computer through vulnerabilities in outdated software. 
  • Download and install up-to-date security programs, including antivirus and anti-malware software, anti-spyware, and a firewall (your device may have come pre-packaged with this type of service). 
  • Destroy all traces of your personal info on hardware you plan on discarding. If the information you stored on the device is critical to protect, the best protection may be to physically destroy the harddrive or the entire device.


Related articles:

- Read more about our security