As not long ago as 2007, the adoption of anti-phishing strategies by companies needing to protect individual and monetary info was small.[ninety three] There are many distinct approaches to battle phishing, which include legislation and know-how established precisely to shield versus phishing.Nota: Walaupun berkemungkinan nombor yang dimasukkan tid