Bad actors can be a threat to any organization. As they infiltrate and gather confidential information about the company. Those action must be considered as critical and proper action must be taken to avoid the risk. The following points can help the user to have some idea about how to overcome this problem.
Follow a robust on-boarding and vetting procedure, while accepting a witnesses/SONs.
Witnesses should be able to keep their anonymity.
Implement proof of pulse consensus.
Ensure setup of witnesses is simple to lower barrier to entry.
Encourage active voting and participation.
Publish witness stats in central location periodically.
Use a White hat to identify the vulnerabilities in any account with user's consent. (White hat -Ethical security hacker)
Deeper monitoring of chain activity.
Push notification for any large transaction (Whale alert)
Establish a "Forensic Team" that can recognize any malicious activities of a witness.
In order to find the solution/ to know in details about the risk that has happened, responder team is one to be communicated first.
There are two members who can inspect the issue,
Log-Diving analyst
Forensics Team
The voters can inform about the invaders, if any.