• Anti-phishing code. 
  • Whitelisting measures.
  • SSL encryption. 
  • Two-factor authentication. 
  • Security audits. 
  • Bug bounty programs. 
  • Penetration tests. 
  • Email encryption. 
  • IP change verification.