6. Additional Security Measures

6.1 Two Factor Authentication