

- Development of e-government infrastructure and online services has had a significant positive impact on interaction and engagement with citizens through e-governance infrastructure. The USA, South Korea and Singapore are regularly being ranked as leaders in this field.
- The provision of public utilities and national defence services has also increasingly also been networked and channelled through IT systems.
- While tremendously useful, if not managed properly, this could expose governments and citizens to severe breaches of privacy, data theft and compromise in the provision of key public services.
- Large amounts of public and private data are now stored and made accessible through government IT systems. This includes public information and documents that are now accessible online, sensitive data such as national ID numbers or tax information, internal government communications such as email and classified security information.
- Different levels of security and protection are required for the different levels of data and it is essential that governments take the right steps to ensure the integrity of the types of information that are stored and accessed on their systems.
- Major cyber attacks in recent years have targeted information and data stored by governments that have compromised citizen security and resulted in enormous cost to and loss of confidence in government.
- North America, Western Europe and Australia lead in committing money and resources to cyber security efforts. Several Gulf and Asian countries have stepped up commitment in recent years following attacks.
- Public Sector spending on cyber security is generally focused on rapid detection and response to a threat, remedial work necessitated by data breaches, and ongoing maintenance of websites and online services.
- The types of cyber security threats posed to governments are numerous with as many levels of severity of impact. Common attacks include: cyber terrorism and threats to critical infrastructure, theft of confidential or sovereign data, denial of service attacks on e-government infrastructure, cyber espionage and advanced persistent threats.
- Counterfeit software, lack of maintenance and lax procurement supply chains pose a significant security risk by providing doorways to malware entering and abusing government networks and systems.
- A resilient cyber security strategy must be holistic and address different stages of an attack, including prevention, response and mitigation.
- An effective roadmap towards constructing a resilient strategy should include steps taken to:
- Raise awareness and the level of understanding among the general population, by educating business owners, students and government agencies on the threats that exist as well as how to protect their networks from attack.
- Ensure Readiness through the creation of Computer Response Emergency Teams (CERTs) that coordinate capabilities and share knowledge.
- Prevention of attacks through building and maintaining a safe and secure network infrastructure and supply chain through good maintenance and procurement practices.
- Responding effectively to attack through empowering legislators, regulators and policy makers with good regulation and using cyber hygiene tools that can fight attack.
- Mitigate damage by rebuilding trust with citizens and other stakeholders through effective communication, established review processes and building partnerships with industry, other governments and international organisations.
Media Cover:
- Tech Trade Asia, 13 April 2015 – Microsoft-commissioned study offers concrete guidelines on effective government cybersecurity https://www.techtradeasia.info/2015/04/microsoft-commissioned-study-offers.html
- Digital News Asia, 15 April 2015 – Cloud and security, and the changing Asian approach https://www.digitalnewsasia.com/digital-economy/cloud-and-security-and-the-changing-asian-approach#sthash.zLCafzHZ.dpuf
- Cyber Attack Squad, 21 April 2015 – Study highlights increasing cyber crime threats to governments https://cyberattacksquad.com/study-highlights-increasing-cyber-crime-threats-to-governments/
- SG Cyber Security, 16 April 2015 – Up to 90% of malware-infected computers in Singapore located in CBD https://www.sgcybersecurity.com/up-to-90-of-malware-infected-computers-in-singapore-located-in-cbd/
- Viet Nam News, 13 April 2015 – Governments still vulnerable to cyber attacks: Study https://bizhub.vn/tech/10687/governments-still-vulnerable-to-cyber-attacks-study.html
- Enterprise Innovation, 21 April 2015 – Study highlights increasing cyber crime threats to governments https://enterpriseinnovation.net/article/study-highlights-increasing-cyber-crime-threats-governments-213576350