Exchange Security Checklist (10‑Point)

2FA, withdrawal whitelist, device checks, session control, and data hygiene — everything you should tick off before funding your account.

TrendReward is an independent marketing affiliate. This is not Bybit’s official website.

1) Enable MFA: 2FA, Security Keys, or Passkeys

Turn on multi‑factor authentication for logins and withdrawals. Prefer phishing‑resistant options (hardware security keys / passkeys) where supported; otherwise use an authenticator app (not SMS) and securely back up recovery codes.

2) Set an Anti‑Phishing Code

Create a personal code so official emails/SMS from the exchange display it. If the code is missing or wrong, treat the message as phishing and do not click.

3) Use the Withdrawal Address Whitelist

Add your own addresses to the Address Book/Whitelist and withdraw only to verified entries. Always confirm network and memo/tag when required.

4) Strong, Unique Passwords + Manager

Use long, unique passwords for your exchange and email. A reputable password manager helps avoid reuse and creates high‑entropy passphrases.

5) Keep Devices Clean & Updated

Update OS/apps promptly, install from official stores, and minimize permissions. Avoid public Wi‑Fi/USB; use a reputable AV or built‑in security suite.

6) Review Active Sessions / Trusted Devices

Regularly review logged‑in devices and sessions; sign out of ones you don’t use. Avoid staying logged in on shared computers.

7) Be Ruthless with Phishing

Double‑check domains, don’t click links from unsolicited messages, and never share codes or keys. When in doubt, navigate to the site manually via bookmarks.

8) Lock Down API Keys (If You Use Them)

Create separate API keys per tool, restrict scopes (read‑only if possible), and whitelist IPs. Rotate keys periodically and store secrets securely.

9) Alerts & Authenticity Checks

Enable security alerts (logins, withdrawals, password/2FA changes). Cross‑check suspicious alerts with your Anti‑Phishing Code and the official help/status pages.

10) If You Suspect Compromise: Pause & Report

Change passwords, revoke API keys, de‑authorize devices/sessions, and consider temporary account deactivation while investigating.

Practical Extras

References (sources used to prepare this guide)

Secure First — Then Trade

Tick off the 10‑point list, then move on to funding and strategy.

Go to Bybit (Official Site)

*Opens a new tab; review Bybit’s latest security features and policies.