In current days of End User Authentication risks, are the any other solutions any of you are using to mitigate compromised access?