7. Use additional security layers such as Two-Factor or Two-Step Authentication.

Sometimes a password — no matter how strong — simply isn’t enough. Two-Factor Authentication, often abbreviated 2FA, is one of the best additional security steps you can use to make sure that your accounts don’t get hacked. 2FA works by using something you know (your password), and something you have (your smartphone). When you attempt to log in and enter your password, you will be prompted to enter additional verification such as a code sent to your smartphone, or a code generated by an application or a security device. Unfortunately, not all websites and services have 2FA enabled, but consider using it where possible. Our Trezor devices are by default designed to use 2FA, but can also serve as a U2F device.

8. Keep your personal hotspot and Bluetooth disabled.

Although your personal hotspot and Bluetooth aren’t as easy to hack as a public wireless network, it is still possible. Hackers can then use your wireless connections to gain access to your device. Keep your personal hotspot protected with a complex password and disable your Bluetooth so that it’s undetectable. If you see an unknown device connecting to your hotspot or Bluetooth, deny it or disable your connection.

9. Download E-mail attachments only from verified senders.

We would bet that at least once in your life a generous prince wanted to share his wealth with you. E-mail scams and viruses are a category of their own. The best way to avoid getting infected through an e-mail is to listen to your intuition and good judgment. Never provide any of your data, do not click links, and don’t download attachments from unknown senders. Always verify that the message came from a legitimate source by checking whether the address of the sender matches the real address. Be on the lookout for typos and language misuse as this is a very common giveaway of a phishing email. When sending messages, encrypt them so they can be accessed only by the authorized receiver. When suspicious mail comes through, always bear in mind that it could be a scam.

10. Do not store your payment details online.

Online shopping is incredibly popular, but it can leave you vulnerable to hackers. Any time you make a purchase online, you run the risk of having your payment info stolen. Thieves can use that to shop online, withdraw cash, or move funds out of your account. Do not store your payment details online, or in any digital form unless you use software designed for that purpose. Remember, convenience comes at the cost of your online security.

The best way to protect yourself is to stay informed. Follow Trezor Blog and subscribe to our Newsletter to stay up to date on the latest news in online privacy, security, and cryptography. Do you have safety tips to share? A cautionary tale we can all learn from? Join the Trezor community and leave a comment below.