Information Technology Services

Are there alternate methods for 2FA authentication?