* Use strong authentication mechanisms (for example, multi-factor authentication) where possible to protect from unauthorized access. | * Use strong authentication mechanisms (for example, multi-factor authentication) where possible to protect from unauthorized access. |