We in addition to evaluate analysis security regulations, two-factor authentication possibilities, and scam cures strategies