An organization is implementing an enhanced security protocol for access to its cloud storage services. In addition to requiring a password, which additional method should be applied to ensure the security of access?
Requiring a company ID badge
Using a security question
Biometric verification
Exclusively using a complex password