Adopt shield protection against intrusive cyber-attacks on impaired users’ devices

  • Use advanced technologies for detecting intrusion anomalies, e.g., online scanners, and pen-testing software
  • Protect APIs using tokens that are renewed hourly, and enhance awareness and processes to avoid theft of API keys
  • Consider and evaluate security of third party services, especially if are major components of your system
  • Paying attention to bugs and vulnerabilities is essential. The vulnerabilities discovered must be fixed or mitigation measures must be taken to reduce the risks. A continuous check and update is better than having larger ones. The system must be designed so that the service is not impacted by security updates
  • Use backup systems to ensure redundancy