Implement multi-channel verification for sensitive actions (voice request + email confirmation + in-person verification) - Establish code words or phrases for verifying identity in sensitive communications - Create policies requiring multiple approvals for financial transactions above a threshold -