Intelligent CIO North America Issue 56 | Page 29

INFOGRAPHIC
South Dakota is the fourth most secure state, scoring 8.7 / 10. Mount Rushmore State has a lower scam rate of 21.5 per 10,000 residents( 20.7 % lower than Idaho’ s 27.1 per 10,000) and 31.5 % lower than Rhode Island( 31.4 per 10,000), suggesting it has a strong cybersecurity infrastructure. It also leads the topranking states in financial stability, boasting the highest income-to-expenses ratio of 1.39. While its internet speeds, including a median download speed of 189.22 Mbps and upload speed of 35.59 Mbps, are 10 % and 48.2 % lower than North Dakota’ s speeds( 210.37 Mbps download and 68.79 Mbps upload), its low latency of 26 ms ensures a reliable online connection.
Kentucky and Idaho are in joint eighth place, scoring 8.1 / 10. Kentucky has a lower scam rate of 24.9 per 10,000 residents, 8.1 % lower than Idaho’ s 27.1 per 10,000, reflecting slightly lower exposure to cyber threats. However, Kentucky has better internet download speed, with a median of 210.34 Mbps, 49.5 % faster than Idaho’ s 140.68 Mbps, making it ideal for remote workers reliant on fast connections. However, Idaho outperforms Kentucky in upload speed, with 29.37 Mbps, 23.6 % faster than Kentucky’ s 23.75 Mbps. Idaho is also more financially stable, with an income-to-expenses ratio of 1.28, 6.8 % higher than Kentucky’ s 1. 17.
about how your remote employees will comply with these guidelines.
To minimise damage, I see two angles 1) endpoint security and 2) application security. In endpoint security, it is all about using effective antivirus software but pushing automatic updates to it. Keeping these measures up-to-date helps prevent malware from infiltrating employee devices.
“ Application security is the second layer of defense. Let’ s say that the endpoint or your employee’ s computer does get compromised, the chance of malware infecting your company ' s infrastructure is high. This is where putting your applications behind a WAAP becomes critical. That way, even in case of a compromise, the WAAP blocks attacks and protects the infrastructure and applications.
At the organisation’ s end, access to critical systems should only be given to a select few and have MFA enabled. Along with that, test all systems extensively by using login credentials to ensure that there are no privilege escalation vulnerabilities. Finally, deploying a perimeter security solution such as a WAAP will ensure that any known vulnerabilities are not exploited by stopping attacks from infiltrating the networks.” p
Venky Sundar, Founder and President, Indusface, said:“ Though the states above are prioritizing fraud prevention, wi-fi speed and financial well-being to create optimal conditions for remote working, it has made employees more reliant on public Wi-Fi networks, which significantly increases the risk of malware infections. While the ideal approach is to avoid public Wi-Fi altogether, you can never be sure
As more employees work remotely, cybersecurity and internet reliability have become crucial considerations.
www. intelligentcio. com INTELLIGENTCIO NORTH AMERICA 29