Your credentials are your main entrance ticket to your Holded account. That is why, when it comes to passwords, creating strong and unique ones makes a difference to protect your data.
We do understand, though, that you may have many accounts and that the thought of reusing passwords may have crossed your mind. Nevertheless, keep in mind that if your password becomes compromised, the rest of your accounts may be at risk too.
For that reason, consider the following practices to help you protect your account.
Use a password manager
Password managers allow you to generate secure and complex passwords. Besides that, they store your login information for all the websites you use and help you log into them automatically. These tools are definitely very useful since they encrypt your password database with a master password, which is the only one you need to remember.
Not sure where to start? You can have a look at the password management options offered by Chrome or Safari.
Turn on two-factor authentication (2FA)
Two-factor authentication provides a stronger, second layer of login protection to ensure you are the only one logging into your Holded account.
Find out how to turn on two-factor authentication for your Holded account here
Log in by using your Google account or Apple ID
If you do not want to use a password manager, there are other options available like signing in using your Google account or Apple ID, which are always better options than reusing passwords.
Read more about how to manage your access and security in this article
Keep your trusted phone numbers up to date
Always update phone numbers associated with your Holded account. It is of utmost importance that the phone number is correct so that you can be sent the verification code to access your account in case 2FA is activated for your Holded’s user login.
Learn more about changing and re-associating the trusted phone number tied to your Holded account by reading this article.
Keep your trusted devices physically secure
Since, of course, your phone number is tied to a physical device, we recommend you take care of it, and make sure you know where to find it. If your trusted device gets stolen or lost, we highly recommend you take the necessary actions to prevent any malicious use coming from the missing device.