Overall, the key points are: verify authenticity, warn about security risks, recommend official sources, and provide contact information for support.