Regularly check the list of devices logged into your CEX® account. Revoke any unfamiliar or old sessions to prevent unauthorized access. Keeping track of sessions ensures you know exactly where your account is active.
Mark only devices you control as trusted. Avoid using public or shared computers for login. Remove devices from the trusted list if they are lost or no longer in use. Device management is a crucial layer of security.
Always log out after finishing your session on shared or public devices. Avoid “remember me” options on untrusted devices. Signing out ensures no residual access is left behind for potential intruders.
Avoid public Wi-Fi when accessing CEX®. Use a secure private connection or VPN. Unsecured networks can expose your login credentials to attackers.
Enable notifications for login activity. Immediate alerts can help detect suspicious access early. Promptly investigate unusual activity and secure your account if necessary.