Industries

Consulting

A consulting firm is a repository of confidential strategy for every client it serves. In March 2026, an autonomous AI agent accessed 46.5 million confidential messages from a top firm in two hours. Aktoh deploys AI and deception technology to protect client confidentiality.
Contact Us
46.5M
Confidential messages exposed in a single 2-hour breach of a top consulting firm's AI platform — no credentials, SQL injection only.
CodeWall / The Register, March 2026
2 hrs
Time an autonomous AI agent needed to achieve full read-write access to a top consulting firm's production database.
CodeWall, March 2026
44%
Of all data breaches in 2025 involved supply chain or third-party compromise — consulting firms sit at the center of every supply chain they serve.
Verizon 2025 DBIR / IBM X-Force 2025

A Letter to Consulting Leaders

— James Spitler, Founder & CEO, Aktoh Cyber
On February 28, 2026, a security firm called CodeWall pointed an autonomous AI agent at McKinsey & Company's internal AI platform, Lilli. Within two hours, the agent had full read-write access to McKinsey's production database — 46.5 million chat messages, 728,000 files of confidential client data, and 95 system prompts governing advice given to 40,000+ consultants. All writable. The vulnerability: SQL injection. Documented since 1998. Your clients trust you with what matters most to them. We take that seriously.
Contact Us
Engagement File Deception
Sleight Platform
Decoy engagement files, phantom client portals, and honeypot matter folders — an attacker touches a decoy before reaching real client matter files.
24/7 Autonomous Threat Detection
Horsemen Platform
AI agents monitoring for bulk access to engagement files, anomalous export activity from M&A data rooms, and credential anomalies in document management systems.
Enterprise AI Platform Security
The McKinsey Lilli Problem
Every consulting firm's internal AI assistant is a single endpoint that, if compromised, provides access to the aggregated intelligence of every engagement indexed.
Client Matter Protection
The Multiplier Problem
When a consulting firm is breached, every client's data is at risk simultaneously. Aktoh maps data flows between internal systems and client engagement files.
Economic Espionage Defense
Your Client List Is a Strategic Map
Nation-state intelligence services target consulting firms because one successful intrusion yields intelligence across dozens of sectors and deals simultaneously.
Third-Party & Data Room Security
Outbound Access Risk
Consulting firms are granted access to client data rooms and board portals. A compromise of your credentials cascades to every client simultaneously.

Defend Your Future.
Secure Yours Now.

Discover how our expertise keeps your world safe, so you can focus on what matters most.
Next-generation autonomous cybersecurity protecting enterprises worldwide.
Get cybersecurity directly to your inbox
Weekly threat intelligence briefings and product updates.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
© 2026 All rights reserved, Developed by