Ten Hacker-Proof Steps to Secure Your Crypto Assets