Skip to main content
The Trailblazer Community will undergo maintenance on Saturday, November 15, 2025 and Sunday, November 16, 2025. Please plan your activities accordingly.

Learn Strategies for Public Servants to Stay Cyber-Secure

Learning Objectives

After completing this unit, you’ll be able to:

  • Apply basic cybersecurity practices in daily public service work.
  • Identify ways to participate in cybersecurity policy discussions.

How Public Servants Can Stay Cyber-Secure

You know that feeling when you create a new password and the system says, “Weak, try again”? It can be frustrating, but there’s a good reason for it. Keeping public services cyber-secure isn’t just about having the latest technology—it’s about the choices we make every day as public servants. Before we dive into how you can help keep your organization safe, let’s quickly review what you’ve learned about cyberthreats public servants are up against.

Knowledge Check

Ready to review what you’ve learned? The following knowledge check isn’t scored—it’s just an easy way to quiz yourself. To get started, let’s review what you’ve learned by matching each cyberthreat on the left to the corresponding scenario on the right. When you finish matching all the items, click Submit to check your work. If you’d like to start over, click Reset.

Keeping Your Work Secure

Have you ever tried to access your work email in a public place (like at a coffee shop) and your system wouldn’t let you connect? That’s ‌ a good thing. Your organization is protecting sensitive citizen data by blocking access through unsecured public networks. For example, when you’re on public Wi-Fi it’s like having a conversation in a crowded room where anyone can hear what you’re saying. By requiring you to use secure connections, like your home network or mobile data, your organization makes sure that citizen information stays private and protected from cybercriminals who might be monitoring public networks.

A security guard standing in front of a vault protecting valuable assets.

Let’s look at other simple but important ways that you can make smart security decisions—similar to the way you lock your office door when you leave for the day.

  • Use strong passwords: Complex passwords (or memorized secrets) are crucial for security. For example, with today’s technology, a password like “password123” would take less than one second to guess. Creating a strong passphrase (at least 8 characters, ideally 12+ characters) is one of the most effective ways to protect citizen data.
  • Use MFA/two-step verification: When your phone gets a code after you log in, that’s called multi-factor authentication. It’s like having both a key and an alarm code for your house. Even if someone gets your password, they still can’t get in without that second step.
  • Stay alert through training: You wouldn’t send your home address to a stranger, right? But what if that stranger looked like they worked at your bank? That’s why training matters. Some cybersecurity programs use games like “spot the scam” to help users practice identifying fake emails and other digital threats.
  • Spot suspicious links: Do not click/open suspicious links in emails or messages (hover over hyperlink).
  • Verify senders: Verify senders before opening/downloading attachments.
  • Report suspicious activities: Report suspicious activities immediately to the cybersecurity team within the organization.
  • Use virtual private networks: Use approved VPNs when accessing official networks remotely and avoid using public Wi-Fi for sensitive work.
  • Secure devices: Lock digital devices when not in use.
  • Use approved devices: Always use official/government, secured devices for work and avoid using personal devices to access sensitive government systems.
  • Stay informed: Know the official cybersecurity protocols in case of a security breach.
  • Follow social media guidelines: Make sure you’re familiar with your organization’s cybersecurity policy so you know exactly how to protect yourself and the organization when working online. Whether that’s knowing what information you can share on social media and specific steps your workplace expects you to follow.

For more comprehensive strategies and tips to stay safe online, review the Cyber Hygiene module, which covers best practices for protecting yourself and your organization from cyberthreats.

Making Security Everyone’s Business

You might think, “I’m not a tech expert—what can I contribute to cybersecurity discussions?” However, your perspective is unique and invaluable because you work directly with public services and citizens. You see firsthand how security measures affect your ability to serve the public, and you’re often the first to notice when something doesn’t seem right.

Your daily experience can help make security better for everyone. Share the challenges you face while following security procedures. If you notice a security measure that makes it harder to serve citizens effectively, speak up and suggest practical improvements. When you spot patterns of suspicious activity, report them. Your insights from daily work could prevent the next security breach.

Different countries have created different approaches to protecting citizen information. In Europe, for instance, the General Data Protection Regulation (GDPR) requires you to get citizens’ permission before sharing their information, even between government departments. This means if someone applies for housing benefits, you need their approval before sharing their details with health services. In Singapore, the Cybersecurity Act requires immediate reporting of suspicious activity. This policy proved its worth when a clerk noticed unusual login attempts and reported them immediately, stopping a potential data breach before it happened.

Think of these security rules like traffic laws—they might seem strict, but they keep everyone safe. Just as traffic laws protect people on the road, security measures protect citizens’ private information and maintain their trust in public services.

What Counts as a Cybersecurity Problem?

Recognizing security problems isn’t always straightforward. Some cybersecurity threats announce themselves loudly—like when your computer screen suddenly shows a ransom demand, or you notice multiple failed login attempts to your account. You might receive unusual emails demanding urgent financial actions, or see system error messages you’ve never encountered before.

However, security threats often show up in more subtle ways. A colleague might ask to share passwords “just this once” to complete urgent work, or you might find a mysterious USB drive in the parking lot. Your computer might start behaving differently, showing unusual popups, new toolbars, or running much slower than usual. You might receive requests to share information through personal email accounts or from unfamiliar partner organizations. Sometimes, files or documents go missing, or your system settings look different for no apparent reason.

Even if you’re not sure whether something is a security problem, always report it to your IT security team. What seems like a small issue might be part of a larger attack pattern. Early reporting often prevents major security breaches, and your observation could help identify ongoing threats. Remember, security teams would rather investigate a false alarm than miss a real threat.

When in doubt, report it! It’s better to be cautious than risk citizen data.

Sum It Up

Every time you create a strong password, report a suspicious email, or properly dispose of sensitive documents, you’re helping protect public services and citizen information. Cybersecurity isn’t just an IT department thing—it’s part of serving the public well, and as a public servant, you’re critical for front-line protection against ever-evolving cyberthreats.

Resources

Salesforce ヘルプで Trailhead のフィードバックを共有してください。

Trailhead についての感想をお聞かせください。[Salesforce ヘルプ] サイトから新しいフィードバックフォームにいつでもアクセスできるようになりました。

詳細はこちら フィードバックの共有に進む