The Reasons Application Fails

reasons application fails

The Reasons Application Fails

 

5 REASONS APPLICATIONS FAIL

99.99% Uptime Is Essential

In today’s modern world of Tele-Medicine, application availability and uptime is more critical than ever.

Healthcare workers and patients are accessing applications at all times of the day and night. The days of “bringing the application down for maintenance” every night are over.

Add to this the fact that most healthcare companies are growing, which adds extra load to these already stressed applications.

EMR and other key applications need to be available virtually 100% of the time.

application error result business loss

How Much Does A Single Hour Of Downtime Cost?

According to an ITIC study this year, the average amount of a single hour of downtime is $100,000 or more. Since 2008, ITIC has sent out independent surveys that measure downtime costs. Findings included that a single hour of downtime has risen by 25%-30%. 33% of those enterprises reported that one hour of downtime costs their companies between $1-5 million. 98% of organizations say a single hour of downtime costs over $100,000. 81% of respondents indicated that 60 minutes of downtime costs their businesses over $300,000.

Protected Harbor has found the design of data centers plays an essential role in its ability to maintain application availability which translates into company credibility with clients, employees, and ultimately dollars gained or lost.

The purpose of this white paper is to outline the top five mistakes companies make when designing, building, and managing data centers.

cost of datacenter downtime

“It’s Much Harder To Manage A Data Center For A Growing Business Than One For A Stagnant Business.”

“This saying has stuck with me over the years. Most of the businesses my company supports are growing companies. They trust I can design, build and manage a data center that will develop with them, and not impede on their growth.

According to a recent article by a top data center management company, only 4% of data center failures are due to IT equipment failure. Only 4%! That leaves 96% of data center failures caused by things outside of your data center equipment, whether it be power failure, cyber-crime, human error, or water/heat.

What does this mean for you? Well, at the inception of designing your Data Center elements that may seem to be innocuous must be considered because these components could have a significant impact on how your data center functions – or doesn’t function. Regardless of whether you are building a data center or migrating, it is imperative that you avoid falling into the traps that have ensnared many before you.

Protected Harbor has enough experience with all the above issues to understand how crippling they can be for small, medium and large organizations. Data centers popularity has increased exponentially over the past decade, and for good reason. They enable a business to expand, while being cost effective and reliable. Recently, a client asked us to list the common mistakes companies make when designing, building and managing their data centers. When compiling this list, we break these mistakes into three major categories; People, Processes and Tools. If you are about to embark down the data center path, make sure you don’t tumble into these pitfalls and wind up in a state of confusion and chaos.”

“It’s much harder to manage a data center for a growing business than one for a stagnant business.
Richard Luna
– CEO, Protected Harbor

01

Five Mistakes Companies Make That Cause Applications To Fail

PEOPLE: Organizing IT Staff in Vertical Roles vs. Horizontal Roles
Human error accounts for almost one quarter of all data center outages

We believe this has a lot to do with how IT staff is organized at most companies. IT staffs will have DBA’s (both development and production), programmers specific to one system, networking experts, and storage experts, etc. This level of specialization can be a big problem.

In many organizations, managers develop elaborate handoff processes that are confusing and often not followed. The programmer hands off the work to the database expert, who then hands off to the storage person. Often, there is no manager, who understands the big picture, until you get to either an IT Director or the CIO, who is too senior and removed from details to provide real direction. IT staffs lose the ability to view the system horizontally (and holistically), to understand the big picture. Often, steps are missed, mistakes are made, and when the data center crashes, groups point fingers at other groups and the true cause of the outage is not determined, which means it could happen again.

We recommend assigning IT process owners, meaning – IT staff members who are responsible for managing IT processes. These individuals first document the process and then put in end-to-end controls to ensure those processes are followed.

02

Inadequate Redundancy

TOOLS: Power issues, including issues with the UPS or generator, and other environmental issues, account for over 45% of data center outages

The IT team may understand the need for redundancy but fail to carry it through the entire system. Often, they will ensure redundancy in one network layer (or portion of the system for communicating data). However, the operational stability of the data center requires that multiple networking layers be on-line, all the time.

In other words, each layer needs to be redundant. For hardware, that means two mirrored firewalls, two drops, and two core mirrored switches. For software, this means multiple servers performing the same function configured in a primary secondary or in a pool configuration. If a server fails, the workload is migrated or transferred to a redundant server. We allow for redundancy at every level.

03

System Software Not Directly Connected To The Firewalls

TOOLS: Cyber-crime accounts for over 20% of data center outages

Any data center needs to be worried about external vulnerability to attacks. Companies can buy a high-end firewall package that does advance monitoring. But what happens behind that firewall? Most companies fail to understand the importance of connecting software login to firewall activity. For example, if the organization has RDP servers that cannot determine a legitimate log-in from an invalid log-in, how do you block it? This isn’t done automatically, because many of the individual apps being used are customized.

The best approach to this problem is to avoid it—design the system the right way, at its inception. For example, deploying a module that after three failed login attempts into a particular app blocks that IP address right at the firewall.

04

Data System Growth Not Sufficiently Considered In Budgeting

PROCESS: Many data centers crash because the data center environment was designed and built for a smaller organization, and cannot handle the increase in load due to company growth.

Many industries and companies see periods of rapid growth, and try to do their best to predict how that might affect operational needs, like sales, marketing, and manufacturing. However, IT often gets left behind in the budgeting dust, and the result is underfunding and an inability of the IT systems or data center capabilities to match the expectations of the rest of the organization.

Typically, this underfunding leads to attempts to cannibalize equipment, exceed their recommended capacities, and go beyond their expected lifespans. It often causes IT staff to find quick fixes to keep the data center operational. Regarding these quick fixes, we often observe a related error: The IT staff forget to remove the bandages that got them past isolated problems. This results in a lost opportunity to go back and properly resolve the underlying problem. There’s just no resources available to do it.

We recommend the IT leader work closely with his/her company’s leadership team to understand business trends, and works with IT experts to design a data center environment that can grow with the organization. Just like leaders of other departments, the IT leader needs to outline key IT investments that will be needed if the company grows. If a company’s core competence is healthcare, they may not want to be in the data center management business.

05

Not Having Clearly Written Procedures, Designated Lines Of Authority, And As A Result, Accountability

PROCESS:  When completing a new deployment, the people who understand the system and the way it was designed should compile the procedural manual for how to handle isolated issues, maintenance, and system-wide failures. This should also include lines of authority, which defines areas of responsibility. Only once these are delineated, can one expect accountability of the individuals on the IT team. Too often, organizations are barely organized, and these vital documents do not exist (or staff are unaware of their existence).

We recommend that procedures are created, documented, and followed in a specified way, guiding appropriate deployment of IT assets. Clearly stated lines of authority are required to make it work.

We Are Here to Help!

If you are an IT executive, director or decision maker and are concerned you company is falling prey to any of the aforementioned problems, let Protected Harbor help you navigate through them by implementing a comprehensive, secure and durable strategy.

Protected Harbor is an MSP that helps organizations and businesses across the US address their current IT needs by building them secure, custom and protected long term solutions.  Our unique technology experts evaluate current systems, determine the deficiencies and design cost-effective options.  We assist all IT departments by increasing their security, durability and sustainability, thus freeing them up to concentrate on their daily workloads.  Protected Harbor stands tall in the face of cyberattacks,  human error, technical failure and compliance issues.  www.protectedharbor.com

IT help

What security risks exist when working from home?

Security Threats of Work from Home

 

What are the Security Threats of Work from Home?

 

With COVID-19 changing the way we work, employees using personal devices at home expose themselves to greater security risks.  Rest assured hackers and malware programs are working overtime to exploit gaps and security oversights.

So what should employers do to ensure their systems remain free of hacks, ransomware attacks, and viruses?

Some employees may think their home is secure and private, however, they most likely will still be less secure than any corporate infrastructures.  Employees’ home offices probably don’t have hardware firewalls in place, multifactor authentications, or VPN’s.   These should all be considered and implemented by someone who is well versed in IT.

One of the most prevalent problems facing employees working at home is email scams.  Yes, they have been around forever but are problematic and sophisticated.  Today’s “scammers” are getting smarter and some phishing scams are created to take advantage of the current work from home scenarios.  These scams can include names of company personnel and may send users to a fake login portal or ask workers to forward login information.

In today’s climate, companies are faced with making things up as they go along because often, they don’t have the time or resources to dedicate to the growing number of work from home offices.  It would be prudent to educate employees on current cyber-crimes and offer training to ensure best practices are adhered to. Multifactor authentication is a key component to prevent attacks.

It is important to provide the necessary steps to in keeping your systems secure and this should never come at the cost of security.  Remote work policies should be monitored and updated often.  Security is never complete because the latest generation of cyber-criminals are bolder and can adapt to endless scenarios.

This is where a company like Protected Harbor can help.  Protected Harbor helps businesses across the US address their current IT needs by building custom, cost-effective solutions.  Our unique technology experts evaluate current systems, determine the needs then design cost-effective solutions. On average, we are able to save clients up to 30% on IT costs while increasing their security, productivity, and durability.  We work with many internal IT departments, freeing them up to concentrate on daily workloads while we do the heavy lifting.  www.protectedharbor.com

Protected Harbor’s New PBX Phone System

Protected Harbor’s New PBX Phone System

 

Protected Harbor’s New PBX Phone System

 

Protected Harbor is proud to introduce a state of the art phone system 3CX.  It is available to all our current clients and anyone in the market looking to upgrade their current set up.  Protected Harbor partnered with 3CX, and provides system configuration and support.

The benefits of this new phone system are plentiful, starting with the end-user being in complete control.  This PBX can be installed on-premise and virtualized on a Linux or Windows platform.   It is easily set up via iOS and Android apps for remote work via QR code.  Staff can easily be added, and voicemail can be set up in minutes.  The user management is simple and easy which will save countless hours of work.

The biggest benefit perhaps, of our system is that it has a softphone so you can make and receive business calls from your PC, tablet or smartphone.  There is no need to be tied to a hard physical phone in your office.  It’s perfect for businesses that have employees working from home during COVID-19.

Moreover, many of the phone features that other vendors classify as add-ons, such as video conferencing, iOS and Android mobile apps or call center features, are included with Protected Harbor’s PBX. So, there are no hidden costs for the features you need.

Switching to this configuration makes complete sense when you compare pricing to that of other PBX vendors such as 8×8 and Avaya. Our system provides a complete unified communications solution that is easy to manage, flexible and affordable. Whether you are a small business or a large enterprise, you can save thousands and avoid all the hassle of purchasing additional extensions and add-ons as your business grows.

Think less about maintaining your PBX, and more about your business – call or email us today to find out more about Protected Harbor’s new phone system! www.protectedharbor.com

WHY IS 99.99% UPTIME IMPORTANT?

WHY IS 99.99% UPTIME IMPORTANT

 

WHY IS 99.99% UPTIME IMPORTANT?

 

Today, businesses of all sizes have grown more reliant on their technology and no business, no matter the size wants to see their systems or site offerings offline – even for a few minutes.  This is why uptime has become vital.  For many companies, uptime is not a preference, it’s a necessity.

Uptime is important because the cost and consequences of downtime can cripple a business, however, no business in any industry can guarantee absolute perfection. Even with tremendous precautions and redundancies in place, systems can fail.  Natural disasters or other mitigating factors out of our control that may require a quick re-boot can’t always be predicted or prevented.

In order to evade debilitating periods of downtime, businesses must employ the most current technologies, designed with uptime in mind, or utilize a managed service provider well versed in the latest technology and long term solutions.

It is no secret that businesses look for 99.99% uptime.  If this percentage seems unrealistic, the additional decimals make a huge difference. The reality is that .1% of downtime is an unacceptable percentage for most companies.  When businesses encounter downtime, they cannot provide services to their customers.  Customers have short memories and as a result, may be tempted to take their dollars elsewhere if they cannot get what they want in a timely manner.

Not only is losing customers disastrous, but productivity can suffer as well.  This is never a good combination.  The average cost of downtime across businesses of all sizes and all industries is around $5,600 per minute.

When a customer selects a company, they need to trust that they are working with a professional and capable organization. Not being able to access a company’s website or employees telling customers they cannot help them at the moment they called does not ensure shopper confidence. This damage can be irreversible to a business’s reputation.

Given that the consequences of downtime are so costly, it’s easy to understand why achieving near-perfect uptime is so important. In order to completely avoid all of the costs and consequences associated with downtime, businesses need to be aiming for uptime of at least 99.99%. While these consequences may seem a bit disheartening, the good news is that there are ways to avoid them. Get connected to our data center and solve your issue.

Protected Harbor helps businesses across the US address their current IT needs by building custom, cost-effective solutions.  Our unique technology experts evaluate current systems, determine the needs then design cost-effective solutions. On average, we are able to save clients up to 30% on IT costs while increasing their security, productivity and durability.  We work with many internal IT departments, freeing them up to concentrate on daily workloads while we do the heavy lifting.  www.protectedharbor.com

Why Virtualization Should Be Considered?

Why Virtualization Should Be Considered

 

Why Virtualization Should Be Considered?

Changing your IT environment to one that is Virtual allows you to instantly access nearly endless system resources that make for all-around optimal performance for your business. Virtualization also gets rid of potentially hazardous server rooms, cables, and bulky hardware; reducing overall IT costs as well as management expenditures.

First, let’s take a look at what Virtualization actually is.  Virtualization is the process of migrating physical systems into a virtual environment. Essentially, it is the creation of a virtual device, resource, or operating system. By providing a virtual view of your systems, this allows you to turn one server into a host for a group of servers that all share the same resources.

By concentrating your storage and systems on servers and installing virtual machines (VMs) to end-users, costs of your systems/infrastructure will be reduced while, management, security, uptime and control, will all be optimized and faster.

Often, many think of virtualization as the actual cloud, however, the cloud is just a piece of virtualization.  The most vital function of virtualization is the ability to run multiple operating systems and or applications on a single server.  In doing this, productivity can be achieved by fewer servers.  Overall, application performance will typically improve as a result of technology that balances resources and delivers what the end-user needs.

Virtualization is a solution for many organizations, however, it’s not for every business.  So how do you determine if this application is right for your environment?

  1. If your company relies on multiple servers and is using laptops and networks, virtualizing the environment will immediately reduce capital costs since there will no longer be the need to pay upfront for hardware.
  2. Virtual environments enable you to run multiple operating systems on the same hardware, hence increasing the flexibility of your infrastructure. Many businesses spend a ton of money on an extra room to store large server racks, wires and pay IT personnel to maintain everything. In this scenario, virtualization will help reduce hardware costs while freeing up room space that can be utilized for other things.
  3. Infrastructure environments that are virtualized allow for rapid and simple scaling – up or down. If your server needs more processing or memory, resources can be easily added.  The days of needing to physically add CPUs or RAM would be over because this concept is done with physical servers.
  4. Most maintenance tasks can be managed easily off-site and don’t require sending techs on site (another cost-saving feature). Also, the maintenance tasks can also be set up to run themselves across a variety of scenarios.

Why would you NOT virtualize?

If you run a very small business or a simple server scenario you might not need virtualization.  While virtualization will save you money, there are set up costs involved. Perhaps you are not prepared for those expenditures at your current juncture.  There is no point in virtualizing your systems if you can’t afford the tools and management systems required to support the technology.

Another reason would be if your software license does not allow you to run on virtual machines. It is always best to avoid anything that could breach your software license agreement, so be sure to check this before moving forward with virtualizing.

Protected Harbor delivers end to end IT solutions ranging from custom-designed systems, data center management, disaster recovery, ransomware protection, cloud services and more.  On average, we save clients up to 30% on IT costs while increasing their productivity, durability and sustainability.  Let our unique technology experts evaluate your current systems and design cost-effective, secure options.

If you are looking to learn more about virtualization solutions, contact Protected Harbor.  www.protectedharbor.com  845-573-1098

Keep Your Business Running – Prepare for The Worst

Keep Your Business Running – Prepare for The Worst

Since the face of how we do business has changed because of COVID-19, businesses should think about (and hopefully prepare for) cyberattacks and security breaches. Having a disaster recovery plan in place to restore critical information is a good place to start.  However, in these times this is simply not enough.

This is why it’s important to have a 360 business continuity plan ready.

Here are some devastating facts from Bureau of Labor, PC Mag, Gartner, Unitrends and TechRadar:

  • Every year, 20% of businesses experience system loss from events such as fires, floods, outages, etc. These types of occurrences not only result in loss of data, but they displace employees and shatter operations
  • 60% of companies that lose their data will shut down within 6 months
  • Only 35% of Small Businesses have a comprehensive disaster recovery plan in place, according to Gartner
  • The cost of losing critical applications has been estimated by experts at more than $5,000 per minute
  • Network downtime costs 80% of small and medium businesses at least $20,000 per hour

If these facts are not enough to ensure a business continuity plan is in place, then you are rolling the dice in a game you will not win.  It is not a matter IF something will happen its WHEN.

A business continuity plan creates a means of keeping your business operational during a crisis. In addition, the plan should include protocols for your devices, communication channels, office setup – including employees, and more.

If you’re currently experiencing unexplained system slow-downs, unexplained outages and trying to maintain normal computer functions, then your system needs definite attention, and you probably don’t have a continuity plan in place. It’s not too late to start, but understand it’s going to take some time and effort but the end result will be invaluable.

This is where Protected Harbor can help. We deliver end to end IT solutions ranging from custom designed systems, data center management, disaster recovery, ransomware protection, cloud services and more.  On average, we save clients up to 30% on IT costs while increasing their productivity, durability and sustainability.  Let our unique technology experts evaluate your current systems and design cost-effective, secure options.

With us, you can be sure your systems will run during a crisis.  Contact us today to find out more.  www.protectedharbor.com

Disadvantages of AWS, Azure, and Other Big Brand Hosting

Disadvantages of AWS

Disadvantages of AWS, Azure, and Other Big Brand Hosting

When it comes to hosting for a business, you don’t want to use just anyone. There are many critical factors to consider including security, stability, uptime, scalability, and more. Because of this, many businesses gravitate towards big, established brands for hosting and management such as Amazon’s AWS or Microsoft’s Azure. But they don’t tell you the disadvantages of AWS.

Companies like these can likely provide well beyond your technical needs. That’s not to say they’re all the exact same. Azure caters to Microsoft products, allowing large companies to move their Windows-based infrastructure online more easily but you’re unaware of Azure hosting drawbacks. Meanwhile, AWS boasts their general flexibility and universal capabilities. The real question here is are cloud services secure?

Each brand has its unique strengths and problems with cloud hosting. When it comes to cloud hosting disadvantages, however, there are some overlapping issues that basically any large-scale hosting company deals with.

Overwhelming Options

Right from the start, many businesses are overwhelmed with the variety of packages and services offered by large hosting companies. AWS, for example, greets you with an entire library of services and products to choose from. Simply trying to find basic website hosting proves to be difficult and confusing that is one of the disadvantages of AWS.

Unclear Pricing Structures

Equally confusing are the pricing structures. Many companies try to sign you up on free trials or temporary discount pricing, only for you to discover the true inflated price months down the road.

These companies also tend to work off a pay-per-use model. In other words, the more data you process and store, the more your hosting costs. While it sounds nice in theory, as you only pay for what you use, it can make it very difficult to predict your monthly costs as prices fluctuate.

It also leaves you severely exposed to DDoS attacks.

DDoS attacks infect a large number of devices with malware and then use them to unleash a coordinated flood of traffic on an unsuspecting network. In addition to slowing down and (likely) crashing your systems, it results in a massage spike of data use.

The average size of a DDoS attack is 2.5 gigabits per second. If you’re being charged per data used, you’ll be left with a very large hosting bill following a DDoS attack.

Advanced Knowledge

Once you’ve figured out what your business needs, the real difficultly begins. Within any given service, there are countless add-ons, tools, settings, and more. While this provides a lot of flexibility and customization, it requires a lot of work and understanding. The deeper your needs go, the deeper your understanding needs to be.

Each platform is different, which means you either need to hire someone who is experienced on a particular platform, or you’ll need to invest in training a current employee. The question is, are cloud services secure? Do you want someone learning a new platform as they’re managing your IT needs?

Support Problems

Platforms like AWS and Azure do offer their own technical support, should you require it. In fact, they often provide a certain amount of free support when you sign up. However, those hours can quickly be eaten up during the onboarding process. After that, you’ll pay for support.

Things can get very expensive very quickly, and it is one of the problems with cloud hosting.

A better solution is generally to find a third party to help manage and maintain your hosting needs. This can provide more affordable support, but it also adds complexity to your hosting management and expenses.

A Simpler, Yet Powerful Hosting Solution

At Protected Harbor, we provide straightforward, yet diverse hosting solutions for businesses of all sizes. Whether you’re a start-up or an enterprise, we have the capabilities to meet your specific needs.

We operate under flat rate costs, so you know exactly what you’ll pay every month. We can even bundle in support hours so that you get professional assistance when you need it. As your company grows, we can easily scale our services with you.

While our initial costs may seem higher, they’re generally cheaper in the long run. Best of all, they’re much less stressful to understand and manage. After all, ETS exists to provide Stress-Free IT. For hosting, computer services, and technical support in Dayton, Ohio, and beyond, contact ETS today.

Go Phishing

Go Phishing

With COVID-19 changing the way many businesses are forced to work, phishing attacks have increased significantly while becoming more complex. Hackers often look at crises as opportunities and COVID-19 is no different. Attackers are using names of coworkers and companies to fool people into thinking they’re legitimate emails. With many employees working from home and logging in, there is an increased reliance on remote system tools, and phishing scams have evolved to mimic them.

Stressful times are upon us and there is no letup in sight. As a result, IT staff are finding themselves overwhelmed as they address a multitude of system issues, software problems, and new problems stemming from employees working remotely. Many employees are using personal devices, which are more vulnerable to cyber-attacks. To be truly prepared for remote work and sophisticated threats, businesses need to analyze their weaknesses and implement proper cybersecurity approaches.

At PROTECTED HARBOR, we provide custom solutions to cyber-attacks, ransomware and other debilitating infrastructure issues. Our team of IT professionals ensures your infrastructure is secure through the creation and implementation of security policies. We analyze and remediate risks to keep you safe. On average, we save our clients up to 30% on IT costs while increasing their security, productivity, durability and sustainability. We are an extension of many IT departments, freeing them up to concentrate on daily work while we do the heavy infrastructure lifting.

Contact us today to find out more, www.protectedharbor.com

What Does the Average Company Pay for Downtime?

What Does Downtime Cost the Average Business banner

 

What Does Downtime Cost the Average Business?

 

One bad experience is all it takes to rattle a business owner. Infrastructure matters and when your system or applications crash. It can have an enormous impact on your bottom line not to mention your business operations.  Monetary and data losses from unexpected crashes can even, in some cases cause a company to close its doors permanently.

According to an ITIC study this year, the average amount of a single hour of downtime is $100,000 or more.  Since 2008, ITIC has sent out independent surveys that measure downtime costs. Findings included that a single hour of downtime has risen by 25%-30%.  Here are some staggering results:

  • 98% of organizations say a single hour of downtime costs over $100,000
  • 81% of respondents indicated that 60 minutes of downtime costs their businesses over $300,000
  • 33% of those enterprises reported that one hour of downtime costs their companies between $1-5 million

The only way to mitigate risk is to be proactive by having the right technology in place to monitor, prevent, and when an attack happens (and it’s not IF but WHEN), having the right company on hand to restore, rebuild and restart. Once you understand the real-life costs of downtime it should not be hard to take proactive measures to protect your business.

Protected Harbor has a full team of technical experts and resources to maintain your system’s well-being and ensure business continuity. Contact us today for a full assessment of your applications and infrastructure.  www.protectedharbor.com

How did Twitter get hacked?

How did Twitter get hacked?

On July 15th many Twitter accounts were compromised.  How did this happen to a company like Twitter?

‘This was the worst social media hack ever happened in history’twitter hacked

The security involvement of the hack are also wide-reaching, not just for Twitter but for other social platforms.

Early suggestions are the hackers managed to access administration privileges, which allowed them to bypass the passwords of any account they wanted.

Twitter appeared to confirm this in a tweet saying: “We detected what we believe to be a co-ordinated social-engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.”

As we generate more content online we are creating a larger digital footprint.  These attackers simply contacted Twitter and asked for the names of key personal, the head of the customer service, their CIO, etc.  Once the attackers knew the identity of key individuals they then researched their web pages, Facebook links, LinkedIn profiles, etc.

The attackers were able to gain enough information from those pages to be able to correctly answer Twitter’s support questions and gain access to those accounts.

Once the attackers had access to an Admin account they could reset end-user accounts and then login as those users.  It was that easy.

Some questions that should be asked; What would have helped prevent this disaster?  Is your system(s) vulnerable to a similar attack?   How can your system(s) be protected?

2FA or Two Factor Authentication would have stopped this attack.  With 2FA the mobile device is registered to the account and the login is not possible until a code on the mobile device is entered.

At Protected Harbor we support 2FA for all systems, allowing our customers to be safe, secure, and protected, as in Protected Harbor.