They monitor suspicious logins and use encryption. Users must avoid sharing credentials or clicking unverified links.