Litecoin
    Electronic Currency
  • Litecoin
  • Bitcoin
  • USD
 
Bitcoin
    Electronic Currency
  • Litecoin
  • Bitcoin
  • USD
Amount
Change currency:
Give
Get

Security Guideline

Protecting your data costs time and money. But the consequences of a cyber-attack can be much more expensive. Don’t take the risk of staying attackable. Here are some steps you can take to guard your business against hacking.

  • Passwords are the first line of defense against cyber criminals.
    It’s crucial to pick strong passwords that are different for each of your important accounts and it is good practice to update your passwords regularly. Use a unique password for each of your important accounts like email and online banking.

The password has to be not shorter than 6 symbols, 8-10 is optimum. Don’t use the word significant for you as the password at all. Certainly, it is better remembered, but it is easier to be hacked. There is a special term for it «social engineering». Adding numbers, symbols and mixed-case letters makes it harder for would-be snoops or others to guess or crack your password. Please don’t use ’123456′ or ’password,’ and avoid using publicly available information like your phone number in your passwords. It’s not very original, and it isn’t very safe. Vary your passwords and change them regularly.

  • Never login to your e-wallet (account) via public access computers.
    First, an administrator of a local network can easily spot your confidential data. Secondly, there is a very high probability of existing malware program in a public computer. So if after a session via the public computer you find you e-wallet robbed, you have nobody to blame, except yourselves.
  • Don’t give out your username and password to third parties.
    Remember that technical support services of payment systems never demand your account password, especially via e-mail. If you have got the e-mail, supposedly from the payment system support, with incoming links into a payment system website (actually with links into a similar site) where you are asked to enter your confidential data — no doubt, you are on a phishing website.

Phishing, also known as website spoofing is the act of creating a fake website with the purpose of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL. These fake login pages resemble the original login pages of sites. Since they resemble the original login page, people believe that it is true and give away their login details to the hackers by trying to login to their accounts. Solution: Never try to login/access your online account from the sites other than the original site.

  • Never open mailto links from unknown people.
    You can be sure that there are the only one «surprise» — a Trojan or something like that. To protect an email address from spam is pretty much a non-issue. However, if you get a spam occasionally you have to delete it without reading.
  • Always type the URL of the site in the address bar to get into the site.
    Do not click on a hyperlink to enter the site. It may happen that you open phishing site, especially if you link to the site from junk email or from other site. Do not click on a hyperlink to enter the site.
  • Сheck existence of an active badge (badge-16) in the browser status bar when you link to a connection protected page.
    You should also verify the authenticity of SSL certificate (a double click on the badge). The website certificate confirms its authenticity, and other websites can’t use it.
  • Don’t neglect any way of protection which is offered by a certain payment system.
    It can be IP Account Protection (Account Guard), security question or something like that. If the system suspects an unauthorized access to your account you get an email with request for entrance confirmation. Thus, besides your login and password a hacker needs to know the e-mail which you use in system — its task becomes much more complicated.
  • Don’t use the password saving function on any browser 
    the passwords can be easily taken away from there.
  • Install an up-to-date ant-virus application.
    Unprotected computers form the backbone of botnet and DDoS attacks, so installing antivirus software is a must. It is recommended to update antivirus databases regularly to maintain the high level of protection.
  • Install a firewall and keep it permanently turned on.
    A firewall will monitor information going in and out of your computer and block unauthorised activity. Monitor your software firewall once it is installed. Keep your firewall updated and regularly check it is still connected and working correctly.
  • Never click a link inserted into emails or messages from unknown people.
    However, if someone from your Friends list insistently offers to click a suspicious link — probably a hacker is hiding under the name of your friend.