Back to Docs

Security Best Practices

Security Best Practices

Protecting your Ketivee account is crucial for maintaining access to all your services and personal data. Follow these security best practices to keep your account safe and secure.

Why Security Matters

  • • Protect your personal information
  • • Prevent unauthorized access to your services
  • • Maintain control over your digital identity
  • • Avoid potential financial losses
  • • Protect your privacy and reputation

Password Security

Strong Password Guidelines

Requirements:

  • • Minimum 12 characters (recommended 16+)
  • • Mix of uppercase and lowercase letters
  • • Include numbers and special characters
  • • Avoid common words or patterns
  • • Don't use personal information

Password Management

Best Practices:

  • • Use a password manager (Bitwarden, 1Password, etc.)
  • • Create unique passwords for each service
  • • Change passwords regularly (every 3-6 months)
  • • Never share passwords via email or text
  • • Enable password breach monitoring

What to Avoid

Common Mistakes:

  • • Using the same password everywhere
  • • Writing passwords on paper or digital notes
  • • Using easily guessable information
  • • Sharing passwords with others
  • • Using default passwords

Two-Factor Authentication

Why Enable 2FA?

Two-factor authentication adds an extra layer of security by requiring a second form of verification in addition to your password.

  • • Prevents unauthorized access even if password is compromised
  • • Protects against phishing attacks
  • • Provides real-time security alerts
  • • Required for accessing sensitive features

Authenticator Apps

Recommended options:

  • • Google Authenticator
  • • Authy
  • • Microsoft Authenticator
  • • 1Password
  • • Bitwarden

Backup Codes

Always save your backup codes:

  • • Store in a secure location
  • • Don't share with anyone
  • • Use if you lose your device
  • • Regenerate if compromised

Device Security

Device Protection

  • • Use device lock screens
  • • Enable biometric authentication
  • • Keep devices updated
  • • Use antivirus software
  • • Enable device encryption

Public Wi-Fi Safety

  • • Avoid accessing accounts on public Wi-Fi
  • • Use VPN when necessary
  • • Don't enter passwords on public computers
  • • Log out completely after use
  • • Clear browser data

Session Management

Regular Maintenance:

  • • Review active sessions monthly
  • • Log out from unused devices
  • • Monitor login locations
  • • Report suspicious activity

Lost Device Actions:

  • • Immediately log out from all devices
  • • Change your password
  • • Contact support if needed
  • • Enable additional security measures

Phishing Protection

Recognizing Phishing Attempts

  • • Urgent or threatening language
  • • Requests for personal information
  • • Suspicious email addresses
  • • Poor grammar or spelling
  • • Unusual links or attachments

Safe Practices

  • • Verify sender email addresses
  • • Check for HTTPS in URLs
  • • Don't click suspicious links
  • • Contact support directly
  • • Report phishing attempts

Official Communication

  • • Always from @ketivee.com domains
  • • Professional formatting
  • • No urgent payment requests
  • • Clear sender identification
  • • Consistent branding

Privacy Protection

Data Protection

  • • Review privacy settings regularly
  • • Limit data sharing
  • • Use strong privacy controls
  • • Monitor account activity
  • • Report data breaches

Account Monitoring

  • • Check login history
  • • Review connected apps
  • • Monitor email notifications
  • • Update contact information
  • • Enable security alerts

Privacy Settings

Recommended Settings:

  • • Enable login notifications
  • • Use privacy-focused browsers
  • • Clear browsing data regularly
  • • Use incognito mode when needed

Data Control:

  • • Download your data regularly
  • • Review app permissions
  • • Delete unused accounts
  • • Opt out of data sharing

Emergency Actions

If Your Account is Compromised

  1. 1. Immediately change your password
  2. 2. Enable two-factor authentication
  3. 3. Log out from all devices
  4. 4. Review recent activity
  5. 5. Contact support immediately
  6. 6. Monitor for suspicious activity
  7. 7. Update security questions

Contact Information

Emergency Contacts:

Response Time:

  • • Security issues: 1-2 hours
  • • Account recovery: 4-6 hours
  • • General support: 24 hours