What happens if a customer’s crypto wallet is compromised?

Sotonye McLeod Bob-Manuel

Last Update 6 maanden geleden

  1. Deposit-Only Wallets:

    • The wallet addresses provided by Yativo are deposit-only, meaning they cannot be used for withdrawals directly. This setup reduces the risk of unauthorized access or funds being moved without consent.
  2. Yativo Security Measures:

    • Yativo employs strict security protocols, including cold storage for crypto assets, encryption of sensitive data, and constant monitoring of wallet activity to detect suspicious transactions early.
  3. Business User Responsibility:

    • As a business user, you are required to comply with strict security standards. This includes using secure API keys, implementing two-factor authentication (2FA), and following best practices for data security.
    • Educate your users on securing their accounts, such as using strong passwords and enabling 2FA on their profiles.
  4. Immediate Actions:

    • If there’s any suspicion of a breach, immediately pause any outgoing crypto transactions.
    • Contact Yativo support to initiate an investigation and possibly lock affected wallets while the issue is being resolved.
Note:

While Yativo provides robust security measures, it is crucial for both the business and its users to maintain high security standards and report any unusual activities promptly.

Was this article helpful?

0 out of 0 liked this article