Use best security practices, including enabling 2FA by default for users (and/or combining such practices with automated fraud detection practices to detect anomalous activity).
Implement encryption protocols that protect all data throughout its transmission and storage. Example: How Estonian xRoad is secured (data storage)
Case Study
( to come soon..)
References