Hi, Teisha. Yes, a key part of creating these controls is to cover many different areas of access that hackers can try to use. There are many different ways they can do this, so a wide variety of security measures should be created too. Educating users, using MFA, and limiting access are some great ways to do this. Thanks for sharing.
SUPPORT
Please Note:
The support ticket system is for technical questions and post-sale issues.