- Anti-phishing code.
- Whitelisting measures.
- SSL encryption.
- Two-factor authentication.
- Security audits.
- Bug bounty programs.
- Penetration tests.
- Email encryption.
- IP change verification.
2. What security protocols does Assetfinx follow? Print
Created by: Sam Assetfinx
Modified on: Sat, 3 Oct, 2020 at 9:04 PM
Did you find it helpful? Yes No
Send feedbackSorry we couldn't be helpful. Help us improve this article with your feedback.