Overview
Use strict data encryption with a proven encryption technique
Use protocol algorithms that are currently considered to be strong by experts in the field, and select well-tested implementations.
For countering spoofing and session hijacking:
Use Transport Layer Security (TLS), Secure Shell (SSH), HTTP Secure (HTTPS) and other secure communications protocols that encrypt data before it is sent and authenticate data as it is received.
Use additional multistep authentication methods.
Weaknesses in password hashing algorithms can be used to steal sensitive information stored on a web or application server. Use cryptographic hash functions to implement password hashing.
Use pentesting. Even the best senior programmers are susceptible to making mistakes. Review the application for potential vulnerabilities. For best results, do it regularly.