top of page

iSunOne Safety Tips

At iSunOne, we have strict security policies in place to keep your information safe. As a part of our security practices, we also ask our clients to take a series of precautions to ensure that no one else has access to their account. Understanding how to identify scams and attacks is crucial to protecting your accounts and funds. To make it easier for you to spot hack attempts, we’ve explained some of the most common methods that scammers may use to gain access to your account and make unauthorized transactions.

Customer Support will Never DM You First

Over the counter (OTC) trade is facilitated through end-to-end encrypted Whatsapp and Telegram Channel. It is paramount that you click the link on the official website, which directs you to the correct Customer Support personnel, and starts the transaction.

Please note: iSunOne Customer Support team will never directly message (DM) you first or initiate a conversation first. CSR is not a salesperson and only answers your questions when you initiate the conversation and raise questions. iSunOne will never call, email, or instant message you proactively and ask you for your username or password. If anyone contacts you personally claiming to be from iSunOne and asks for sensitive information, do not reply and report them to our support team.

Account takeover

Since you use your email for log in, clients’ email addresses can be a target for account takeovers. If someone gains unauthorized control over your email, they could potentially gain access to your iSunOne account. It is vital that you have good security for your email; this includes a strong password, security questions, and 2FA. For any amount of large transactions, we have an extra layer of security that you can Whatsapp and/or Telegram our Customer Support team to facilitate the transaction.

Phishing Attacks

Phishing attacks attempt to trick you into revealing your account username, password, or other personal information. This kind of scam can take several forms, below are a few examples:

  • Emails: You may receive an email that appears to be from iSunOne but was actually sent by a scammer, asking you for information or leading you to a fraudulent website.

  • Websites: These websites may look exactly like the iSunOne website, but all the information you enter there, such as usernames and passwords, is recorded and can be used to hack your true account.

  • Calls: Someone may call you, pretending to be from iSunOne, asking you to provide your username, password, or other information.

  • Instant messages: Scammers may send you messages pretending to be iSunOne officials and prompting you to share your username or password. They may also push you to open unsafe links.


This kind of account hack is done through software. Scammers gain access to your devices through complex programs that allow them to take control of your devices and steal your passwords or other sensitive information you may have saved on them.

Identity theft

This is when someone impersonates you after gaining access to enough of your personal information. Ill-actors will then attempt to open an account in your name and make unauthorized transactions. Identity theft most often occurs when your documents, like an ID card, passport, or driver’s license, get stolen. Note that documents don’t always need to be physically stolen, scammers can also steal your ID information through phishing or theft of personal devices like phones or computers.

Tips on Protecting Your Accounts, Information & Funds

To wrap up this article we’ve prepared some tips to help you keep your crypto secure:

  • Create a strong password: Use a password with at least 12 characters with alphabet, number and special characters. Do not share it or use it for other accounts.

  • Enable two-factor authentication (2FA): This is an added level of security that requires a unique code every time you log in to an account. The 2FA code is sent to your email and is required in addition to your username and password.

  • Protect your email: Keep your email address secure so that nobody can access your iSunOne account through your email.

  • Do NOT share personal information: iSunOne employees will never ask you for your password or 2FA code, nor will they ask you to authorize transactions.

  • Check the URL: Before clicking an ad, make sure you are on our official webpage or our interactive webpage Scammers will often use similar URLs, so be sure to check carefully.

  • Check the email domain: Any communication from us will come from an address. If you have any doubts about the legitimacy of an email, check with our support team .



Commenting has been turned off.
bottom of page