Earning public trust in the age of cyber threats
Microsoft explores how government can build public trust in transformational technologies
Data security is a vital part of building trust. Credit: Fotolia
Often we hear about the “public trust.” While its common-law roots refer to the air, rivers, and lands commons to be shared by all citizens, the term today also connotes an attribute of the relationship between citizens and governments who can meet their needs in a digital world. Personal and business security matters. There is no security without cybersecurity. In this age of growing cyber threats, this means that governments must demonstrate they can protect citizen and employee data while delivering the services their constituents expect. In short, governments must earn their trust.
Cities are already using cloud services and Internet of Things (IoT) along with big data, mobility, and social media, to transform their operations so they can deliver services more efficiently and invent new ways to address age-old civic issues. But alongside their transformations are ever-increasing vulnerabilities to cyber-attacks. Keeping data secure is one of several important steps needed to assure citizens and earn trust in these transformational technologies. Are governments ready?
Many cities have developed defence-in-depth plans for cyber threats, but many more must take the needed steps to boost their defences. For example, in a 2015 UK survey of 150 senior public sector IT executives, 40% said their organisations had experienced a significant data breach in the prior year, and 61% had lost important documents.
These findings echo what we hear from city officials worldwide. They face growing pressures to safeguard data security and privacy, but must do so with shrinking budgets and increasingly limited in-house skillsets. The risk is that any data security breach will undermine the public’s trust in their governments’ abilities to prevent intrusions. Without that trust, it can be far harder to win citizen approval of other projects, especially those related to IT infrastructure and management.
One way cities can address the growing need for cybersecurity is to adhere to the ISO/IEC 27001 family of security standards. Another is to adhere to ISO/IEC 27018, the first global code of practice for cloud privacy to protect personally identifiable information (PII). If doing so is beyond a city’s resources, it should seek partners who can provide the reliable and certified data stewardship that’s needed.
Microsoft is committed to earning your trust as your partner in safeguarding your data. For decades, Microsoft has developed enterprise software and run some of the largest online services in the world. With this experience, we continuously improve security-aware software development, operational management, and threat mitigation practices that are essential to the strong protection of services and data in the cloud.
In addition, Microsoft hires the British Standards Institution (BSI), an accredited, independent certification body, to annually audit our compliance with ISO/IEC 27001 for our Azure cloud platform as well as Office 365 Government and Dynamics CRM Online Government, plus several other cloud offerings.
This audit helps to ensure we continue to fulfill our four commitments to governments, enterprises, consumers, and people around the world: We will keep their data secure; we will ensure people’s data is private and under their control; we will figure out the laws in each country and manage data accordingly; and we will be transparent so people know what we are doing.
Start with these resources
The ISO/IEC 27001 security standards can serve as a great starting point for IT professionals in cities and other public-sector organisations seeking to learn more about best practices for cybersecurity. You can read more about Microsoft’s compliance with these standards, including ISO/IEC 27018 by visiting the Microsoft Trust Center.
We also invite you to download the Cyber Security Demystified eBook, which offers valuable insights into safeguarding data privacy and security in your organisation.
Download the Cyber Security Demystified eBook
 “Seeing Information Differently: The Public Sector / Managing Information Through the Challenge of Change.” Iron Mountain UK. 2015.
The Government Transformation Strategy set out an array of ambitions for a three-year timeframe that has now reached its end. A range of expert commentators discuss whether its aims have been...
Organisations do not need to make submissions but will be supported if they wish to do so
London university hosts online examinations with many other institutions set to follow suit
Those unable to attend work will be able to obtain evidence via website or 111 service