Бұл мақаланы қазір сіздің тіліңізде оқу мүмкін емес. Ағылшын тілінен аударатын автоматты аудармашы қолданғаныңыз жөн.

15 Tips to Enhance the Security of Your Binance Account

2019-05-13

Main Takeaways

  • Keeping your Binance account safe and secure is a two-way street — while Binance always keeps its security measures robust and updated, Binance users must also practice good security habits.

  • In order to help you improve the security of your Binance account, here are 15 tips for you to bear in mind at all times.

As Binancians, we must work together to keep our ecosystem SAFU. To help facilitate this, we’ve compiled a list of important security habits for you to practice and keep in mind (updated on February 22, 2023).

Security is Binance’s number one priority. We have invested countless hours and resources into protecting our platform from bad actors, incorporating big data analysis and AI algorithms and partnering with many cybersecurity and compliance firms in the blockchain space. Still, the best security partnership we can build is with the Binance community itself.

Each and every Binancian has the power to ensure that the community remains SAFU from bad actors, starting with cultivating habits that help keep accounts safe. Building on our organization's commitment to preventing unauthorized activity and our community’s heightened sense of security, we can create a safer environment for all digital asset users.

15 Security Enhancement Tips for Your Binance Account

1. Always use two-factor authentication (2FA).

Activating 2FA on your Binance account is a crucial first step towards securing your funds. Currently, we offer these options for 2FA: Biometrics and Security Keys, Authenticator App, Email, and Phone Number. 

Since June 2019, we’ve added support for hardware security keys, such as Yubico's YubiKey. These devices securely grant access to your account when plugged in, or paired wirelessly. This process is similar to traditional 2FA methods but doesn’t require any code to be manually entered, necessitating physical access to the device.

2. Check the list of devices authorized to access your Binance account.

If you see any device you don’t recognize or no longer use, simply remove it. To do so:

a) Log into your Binance account and navigate to your profile on the browser or app.

b) Review [Device] under the [Security] menu on the app.

c) Remove any unrecognized or unused devices. Once a device is deleted, it will no longer be able to access your account unless you re-confirm it via email.

3. Use a strong password for your Binance account and change it regularly.

It should be at least eight characters long, contain at least one uppercase and one lowercase letter, one special character, and one number. We also strongly discourage you from reusing passwords previously entered on other websites and apps. 

Still, even a strong password may be obtained by an attacker, so be sure to change your password periodically. This applies not just to your Binance account but also your email and other accounts (especially those attached to financial accounts). For your own security, your withdrawals are suspended for a period of 24 hours any time you change your Binance account password.

4. Allow withdrawals only to addresses you trust and check your whitelist regularly.

Binance's Withdrawal Address Management feature allows you to limit the wallet addresses to which you can withdraw your funds.

As each addition requires email confirmation, this feature can protect you in the event of unauthorized access. Simply enable the [Whitelist] option in the [Withdrawal Address Management] section.

5. Complete identity verification for your Binance account.

Doing so allows you to trade digital assets on Binance while protecting you from attackers who may claim ownership of your account. It also allows our customer support team to resolve any issue you may face more quickly and conveniently.

Identity verification, also called the “know your customer” (KYC) process, is an increasingly important aspect of cryptocurrency-related services, especially on major exchanges like Binance.

6. Consider managing some funds in your own wallet (e.g. Trust Wallet).

However, you must be extra careful. No matter how secure an exchange platform may be, it is often argued that your funds are most secure in your own possession.

Trust Wallet, Binance’s official crypto wallet app, provides you with a convenient way to securely store your funds away from third parties. It also supports most major cryptocurrencies and all ERC-20 tokens, and is available for both Android or iOS. You can easily integrate your Trust Wallet with Binance DEX and trade on the exchange.

However, bear in mind that you should never share the seed / recovery phrase or private key you generate for your Trust Wallet with anyone, as this would give them full control over your wallet and funds. You should also ensure you are using official apps, as fake apps are often used to steal your personal information.

7. Take the necessary steps to secure your account when using an API.

A large portion of the Binance community uses our API, the programming interface that allows Binance data to be shared with other applications. While APIs give users a more customized trading experience, they must be used securely.

When using an API, take steps such as restricting access by IP address, keeping your API keys secret from third-party services, changing your keys regularly, and using the aforementioned withdrawal address whitelist.

8. Regularly check official messages from Binance for security updates.

At Binance, we make it a point to inform everyone who uses the exchange of any security-related updates, be it via an email, an FAQ post, or a blog article like this one.

We also broadcast these updates on our official social media channels. It’s vital to make sure that your sources of such Binance-related information are official, as we’ve had experience with impostors who pretend to represent us.

9. Make sure your Internet connection is secure.

This step includes your Internet service provider (ISP) and any software services you use. Avoid connecting to public WiFi networks and other shared connections as far as possible; these present the risk of exposing you to attackers seeking to intercept the data you transmit. 

10. Install antivirus software and trust only secure apps and programs.

Always ensure the apps you use and files you access or download are not infected with malware that may compromise your data. Protect all your devices with the latest version of your preferred anti-virus software and schedule scans regularly.

Always download apps and programs from trusted, official sources and avoid accessing links or software shared by anyone you neither know nor trust. For additional security, you may consider a dedicated device strictly for your sensitive account(s). Binance FAQ also has a list of guidelines that focus on antivirus software

11. Put a lock on your phone.

If you use your phone for 2FA and other sensitive activities, it’s crucial to keep it protected at all times. Whether it’s via password or fingerprint, any additional layer of security counts. 

12. Use a secure password manager.

While multiple secure and different passwords are recommended, they are not easy to remember. Password managers make it easier for you to keep track of complex passwords across multiple accounts, and many of these services have sophisticated encryption mechanisms to make password storage more secure.

13. Use unique emails for each of your accounts, including your Binance account.

Most people use one or two emails for all their accounts, making it easier for their information to be shared across different websites and services.

A sophisticated attack can leverage data stolen from you on one service to attempt to access your account on another service. Use a unique email for each of your accounts to minimize the risk of bad actors stealing your sensitive data.

14. Constantly check your network of contacts for potential security threats to avoid social engineering attacks.

Nowadays, security breaches go beyond the usual hacking attempts like phishing and other tech-related methods.

Often, attackers pretend to be people you know or with whom you interact online. Such communications, which attempt to manipulate people into giving up personal or confidential information that can later be used against them, are called social engineering attacks. 

In the context of crypto, this means you should avoid certain behaviors, such as posting screenshots of your crypto holdings on social media or bragging about your trading wins to anyone, especially online. The more crypto you own, the more likely you are to become a target for hackers and scammers.

This also means you should be careful with whom you communicate. As mentioned above, there are scammers who pretend to be from Binance (usually Binance Customer Support) to try to trick you into giving your account details to them.

15. Identify and avoid phishing and malware campaigns.

Always check the emails you receive and the websites you log into. Many successful attacks involve fake websites, emails, and messages from services with which you have accounts. Malicious browser extensions and applications are often to blame for compromised accounts or wallets.

When you install browser extensions or applications, these programs can gain full access to various aspects of your browser or device, potentially allowing unauthorized access to your online accounts (including exchange accounts) and even personal wallets.

Exercise caution when selecting browser extensions and applications, especially those that are crypto-related or claim to offer security for crypto activities. Try to limit your usage to known and reputable options and stay aware of potential security issues.

Make it a habit to check the address of any website you visit and the sources of your emails for accuracy. You may read this comprehensive guide on how to avoid phishing from Binance Academy, which has even more security tips for crypto users.

Further Reading