I in addition to evaluate study security formula, two-factor authentication alternatives, and scam protection strategies