Role and authorization checks are important measures that increase security. Only constant checks can ensure that incorrect authorisations do not lead to damage. A continuous adaptation of the own system configuration is also necessary. Targeted specifications regarding passwords and encryption must be defined and controlled by the company.
Another important factor is system utilization. With the help of your own penetration tests, an attack on your own system can be simulated. In this way it is possible to recognise the effects and take measures against these types of attacks or stresses.
Attack prevention is already significantly mature in many companies. What is often a problem is the attack detection. This is directly related to the responsiveness of the company. The faster the attack is detected, the faster countermeasures can be initiated, which drastically reduces the cost of such measures.