1) Use two-factor authorization FOR ALL crypto accounts - wallets, exchange, etc.
2) Use ONLY trusty sites for cryptocurrencies - don't use new exchange, use only old and trust exchange - like Bittrex, Bitfinex, Binance etc.
3) Never send your private keys from wallets (so many scam-airdrops sites ask it).
I agree with these recommendations, however I will add few more points:
4) Make use of Antivirus, Anti-Malware software and Firewall and make sure to keep them updated.
5) Wether you use Microsoft Windows or Linux or any other OS: Update your OS and other software frequently, if not automatically. This keeps hackers from accessing your computer through vulnerabilities in outdated programs.
6) Do not use open wifi; it makes it too easy for hackers to steal your connection and do illegal stuff
7) Protect all of your devices with at least password (if not 2FA, fingerprint etc..) , including your desktop, laptop, phone, smartwatch, tablet.
Use strong passwords, change them frequently and use strong security answers. (For example What is the name of your God? Answer: "My Dog Does Not HavE a NamE"
8 ) Be a SMART Surfer:Before opening links especially in email, make sure you know and checked the sender.
Hover over links to see the actual email address from which the email was sent. Is it really from the person or company claiming to send them? If you’re not sure, pay attention to sentence construction and formatting. If something still seems fishy, do a quick search on the Internet for the subject line. Others may have been scammed and posted about it online.
9) Keep sensitive data off the cloud. No matter which way you choose to cut it, data stored on the cloud doesn’t belong to you.
10) And Finally - Simply Don’t share personal information - Be very sensitive with the information you share online, via email, and even over the phone. Credit card numbers, bank account information, and social security numbers are popular targets for hackers and identity thieves. If you have any reason to believe that this information is being requested for illegitimate reasons, don’t provide it. For extra precaution, verify in person or over the phone with any party or company requesting this information. When it comes to protecting yourself and your personal information, sometimes you can’t be too cautious.