Verification should include
checking the uniform resource locator (URL)
applying the Web browser’s security features
applying third-party security software features.