The security manager at Crucial Technologies wants to help mitigate the possibility of someone being able to access another user’s account by gaining access to the user’s password. What logical security technology should be implemented to satisfy this requirement?
MFA
Encryption
Password complexity rules
WPA2