Essential Security Tactics to Implement After the Bybit Hack