Concrete actions ranked by impact. Items marked critical are the highest-leverage protections; do those first.
Use hardware wallet for any non-trivial amounts
Hardware wallets (Ledger, Trezor, Coldcard, BitBox, GridPlus) keep private keys on dedicated devices that never expose keys to internet-connected systems. Transactions are signed on the hardware device after physical confirmation. Defeats most software-based attacks. The cost ($50-200) is trivial compared to amounts being protected.
Seed phrase: offline only, multiple copies, secure locations, NEVER cloud
Seed phrase written on paper or stamped on metal (Cryptosteel, Billfodl, similar). Multiple copies in geographically-separated secure locations (home safe, bank safe deposit box, trusted family member). NEVER in iCloud, Google Drive, photos, password manager (debatable), email, or any electronic storage with cloud backup. Single seed phrase loss to compromise typically means total fund loss.
Verify destination addresses character-by-character on every transaction
Clipboard hijacking and address poisoning specifically defeated by careful address verification. Look at first and last several characters; for high-value transactions, verify entire address. Use hardware wallet display (which shows actual address being signed) rather than relying on screen of compromised computer.
Never share seed phrase with anyone or anywhere
No legitimate purpose requires sharing seed phrase. Wallet "support" asking for seed phrase is fraud. "Recovery services" asking for seed phrase are scams. The rule has no exceptions; teach this to everyone in your life.
Use small "hot wallet" for daily activity, hardware wallet for storage
Common pattern: small amount in hot wallet (browser extension or mobile app) for active use; majority of holdings in hardware wallet, accessed only for occasional larger transactions. Limits exposure if hot wallet compromised; transactions on hardware wallet require physical access.
Audit and revoke smart contract approvals regularly
Tools like Revoke.cash, Etherscan token approvals, similar tools for other chains let you see and revoke smart contract approvals. Quarterly audit; revoke approvals to contracts no longer in active use. Particularly important after using DeFi protocols where unlimited approvals are common.
Use minimal browser extensions; verify their legitimacy carefully
Browser extensions with wallet-related permissions are high-value targets for compromise. Use only well-established extensions from clear ownership. Audit installed extensions periodically. Consider dedicated browser profile for crypto activity with no other extensions.
Verify wallet software downloads carefully
Download wallet software only from official sources (official website typed directly, not via search results). Verify checksums where provided. Avoid wallet apps from unofficial app stores. Major wallet brands have been impersonated; due diligence on download sources matters.
For substantial holdings: multisig wallets
Multi-signature wallets require multiple keys (typically 2-of-3 or 3-of-5) to authorise transactions. Even compromise of one key does not lead to fund loss. Operationally complex; appropriate for substantial holdings or organisational treasuries. Major wallets (Gnosis Safe, Casa, Unchained Capital, Nunchuk) provide multisig solutions.
Operational security: do not publicise holdings or addresses unnecessarily
High-profile crypto holders are targeted by both online attacks and physical attacks. Discretion about holdings, addresses, and identifying information reduces targeting. The crypto culture sometimes encourages public discussion of holdings; resist this for security reasons regardless of cultural pressure.
For airdrops and new tokens: due diligence before signing anything
Many "airdrop" opportunities are wallet drains — interactions request signature that grants attacker access to existing tokens. If something seems too good to be true (free tokens for connecting wallet), it almost always is. Specifically, never sign transactions you do not understand; use tools that decode transaction details before signing.
Consider using a clean device specifically for crypto transactions
Dedicated laptop or device used only for crypto, not used for general browsing/email/social media, dramatically reduces malware exposure. Higher-value users particularly benefit. The operational overhead is justified by the security improvement for substantial holdings.