3. Flag untrusted locations. If a geolocation for an access request comes from a place where it’s uncommon for someone to need access, you can ask for additional authentication. Or you can just deny ...