1 — Quick checks before you type
Do these 6 fast checks every time you sign in. They take less than a minute and stop the majority of accidental exposures:
- Open Coinbase from a bookmark or the official app. Typing the URL from memory or following an unknown link increases phishing risk.
- Confirm HTTPS & the correct domain. Make sure the address bar shows
https://www.coinbase.com(or the official app). Look out for extra words, unusual subdomains, or tiny misspellings. - Unlock your password manager. If your manager refuses to autofill, pause—managers only fill exact domains and will often detect fake pages.
- Have your second factor ready. Authenticator app, hardware key, or passkey—don’t begin a sign-in you can’t complete.
- Use a secure network. Prefer a private network or cellular data; use a trusted VPN if you must use public Wi-Fi.
- Check for recent email warnings. If you received suspicious account emails recently, investigate them via the bookmarked site before signing in.
2 — Passwords: make them unique, long and manager-held
Passwords remain central. Use a reputable password manager to generate and store a long, unique password for Coinbase. Recommended approach:
- 16+ characters or a multi-word passphrase—length beats complexity tricks.
- Never reuse passwords across financial, email, or exchange accounts.
- Protect your password manager with a strong master password and its own MFA.
- Rotate passwords if your email appears in a breach or if you notice suspicious account activity.
Why a manager helps: it not only creates strong secrets but also helps detect phishing automatically—if it doesn't fill, that’s a warning sign.
3 — Two-factor authentication & passkeys — enable strong options
Always enable a second factor before you need it. Coinbase supports multiple 2FA options. Prefer phishing-resistant methods:
- Passkeys / FIDO2 — modern, device-bound credentials that are extremely phishing-resistant and simple to use on supported devices.
- Hardware security keys (FIDO2 / WebAuthn) — physical tokens (USB/NFC) that only authenticate to the genuine site.
- Authenticator apps (TOTP) — Authy, Google Authenticator, Microsoft Authenticator: reliable when you keep secure backups or backup codes offline.
- SMS — weakest option; vulnerable to SIM-swap and number-porter attacks. Use only if stronger options are unavailable.
When enabling 2FA:
- Save backup/recovery codes in a secure offline place (safe, encrypted hardware). Do not store them in plain cloud notes.
- If you plan to move phones, follow official migration steps for your authenticator or re-register passkeys on the new device before wiping the old one.
- Consider registering a spare hardware key and storing it in a secure location as an emergency fallback.
4 — Device hygiene: the device you sign in from matters
Your phone or computer is part of your security boundary. A compromised device can leak credentials or intercept authentication. Keep devices safe:
- Install OS and app updates promptly; security patches close real attack vectors.
- Use a strong screen lock (PIN/biometric) and enable full-disk encryption where available.
- Avoid installing unknown apps or browser extensions with broad permissions.
- Use a separate browser profile for financial sites to reduce risk from extensions and cookies.
- If troubleshooting, try an incognito/private window to rule out extension interference.
5 — Network safety: avoid risky Wi-Fi and DNS tricks
Untrusted public Wi-Fi is risky. Attackers can attempt man-in-the-middle or DNS manipulation attacks on misconfigured hotspots. Use a reputable VPN if you must use public Wi-Fi, or prefer mobile data for high-value actions. Additionally, ensure your router uses a secure DNS provider and keep its firmware updated.
6 — Spot phishing & social engineering before you type
Phishing attacks are the most common way accounts are taken. Recognize red flags:
- Email sender domains that are similar but not exact (extra letters, different TLDs).
- Links that go to shorteners or suddenly redirect; hover to preview the real destination (desktop) or long-press (mobile).
- Urgent language demanding you "verify" or "unlock" now — attackers use deadlines to push mistakes.
- Requests for codes, passwords, or private keys via chat, SMS, or email—never share these with anyone.
If you suspect a message is fake, do not click links. Report it to Coinbase via their official Help Center and go to your bookmark to check account status manually.
7 — Plan recovery before you need it
Prepare recovery options now so you are not rushed later. Things to do:
- Secure the email address on your Coinbase account with a unique password and MFA.
- Store backup codes offline (paper in a safe or encrypted hardware device).
- Register a secondary authenticator device or spare hardware key if you rely on physical tokens.
- Bookmark Coinbase’s official support pages and know the recovery flow so you can follow it exactly when needed.
8 — Troubleshooting sign-in issues (safe order)
If you cannot sign in, follow this ordered checklist to avoid mistakes that could lock you out or expose you to scams:
- Confirm you’re on the official Coinbase domain or official app (use your bookmark).
- Check caps lock and keyboard layout; paste the password from your manager rather than retyping.
- If you forgot your password, use Coinbase’s official password reset flow and check spam/junk folders for the reset email.
- If 2FA codes are failing, check device time is set to automatic network time (TOTP depends on accurate clocks) and use backup codes if available.
- Try another device, another browser, or an incognito/private window to rule out extensions or cached sessions.
- Check Coinbase’s system status before repeatedly requesting resets—platform incidents may temporarily affect flows.
- If automated methods fail, open a support request via Coinbase’s verified Help Center and follow their instructions. Never provide codes or passwords to anyone who contacts you unsolicited.
9 — Immediate actions if you suspect compromise
If you believe your account has been accessed by someone else, act quickly and carefully:
- From a known-safe device and network, change your Coinbase password and revoke active sessions if the option exists.
- Reset or remove exposed 2FA methods and re-register stronger options (hardware key/passkey); store new backup codes offline.
- Open an urgent support ticket via Coinbase’s Help Center and report unauthorized activity—include timestamps and transaction IDs if available.
- Contact your linked bank or payment provider if funds are at risk and consider placing fraud alerts if identity theft is possible.
- Monitor related accounts (email, phone, other exchanges) for suspicious activity and enable MFA on them if not already enabled.
10 — One-minute pre-sign-in checklist (always do these)
- ✅ Use bookmark or official app (do not click links in messages)
- ✅ Unique, long password stored in a manager
- ✅ MFA enabled (prefer passkeys / hardware keys) and backup codes stored offline
- ✅ Device patched, locked, and free of unknown extensions/apps
- ✅ Trusted network or VPN in use
Following these layered, practical steps dramatically reduces the chance of accidental exposure or account takeover. For account-specific actions (resets, recovery, disputes), always use Coinbase’s verified Help Center or the official mobile app.