fromBloomberg7 months agoBloombergUnusual activity from a computer network can trigger security measures that prompt users to verify their identity. This is designed to protect against automatic abuse.