The first top priority is the immediate integration of a multistep verification system for administrative emails and other communication channels. The main reason why the attack took place was due to the lack of serious security measures for the internal communication channels. It is important to note that the hacker or hackers did not impose major losses and damages, which they could have. The second priority is a complete redesign of the communication network within the company. All sensitive information was communicated through a single communication channel, which is corporate email. This flaw needs to be eliminated by creating several highly secure communication channels which are independent of each other and used for different purposes.
For example, patent data information should not have been communicated in the same channel as merger and acquisition tactics. In other words, the company’s division and department need to have their own communication channel, which means that a future security breach will not result in a leak and access to all sensitive data. The third priority should be investing in and expanding the security analyst and expert team in order for the company live up to its supposed expert position on security.