Learn about public sector cybersecurity, key challenges, strategies, and best practices to safeguard government systems and protect citizens' sensitive data.
Once upon a time, computer crimes were associated with the image of a hacker in a black hoodie working in a dark room by the glow of a monitor. But times have changed, and so have the threats. From simple penetration attempts, cyber attacks have evolved into complex, coordinated operations specifically targeting state systems, rather than pursued merely for entertainment or recognition.
Today, cyber attacks on government structures occur for various reasons. Some attackers are motivated by political pressure, attempting to influence legislative decisions or discredit the authorities. Others seek recognition in the world of cybercriminals, counting on fame and reputation. A third category has purely commercial interests. However, the most prevalent motivation remains the theft of personal data of citizens stored in state registers: medical records, registration documents, income data. This data is then sold on the dark web, generating millions of dollars in the process.
This is precisely why cybersecurity in the public sector cannot tolerate mistakes. Unlike private companies, which can afford certain risks for the sake of innovation, the public sector opts for verified, tested, and maximally secure solutions. After all, breaches in healthcare systems can cost people their lives, failures in transport systems can lead to road chaos, and compromises of citizen registries leave millions vulnerable to fraud.
Over the past year, the volume of cyber attacks on state bodies has increased by more than 40 percent. This figure speaks for itself. It is no longer possible to view public sector cybersecurity as a secondary issue to be dealt with later. This is a matter of national security and citizen trust. And this urgency is intensified by the growing digitalization of the public sector.
If you've ever watched the series "Black Mirror" or "Mr. Robot," you know how terrifying scenarios of cyber attacks at the state level can be. Unfortunately, reality is sometimes even worse than fiction, but the sector itself is indeed very conservative. Therefore, overly untested or innovative ideas are not introduced here. Everything that the state integrates undergoes dozens, and sometimes hundreds, of rounds of verification, testing, and controlled attacks to identify weaknesses.
Real examples illustrate the scale of the problem. In 2021, hackers attacked American healthcare systems, rendering hospitals non-operational. In 2022, the Portuguese tax service was compromised, with data from millions of citizens stolen. In 2020, the United States experienced a powerful attack on Baltimore's municipal real estate registration system, making it difficult for residents to obtain documents.
Groups similar to "Anonymous" deserve special mention. These well-organized cybercriminals are motivated not solely by financial gain. They attack state structures as symbols of systems they wish to destabilize or criticize. Such attacks are harder to predict because the driving force behind them is not just money but ideology. Cyber security threats to government from such organized groups represent an unprecedented challenge.
Precisely because of such threats, the state can no longer rely solely on internal resources. The IT departments of government bodies simply do not have sufficient resources and expertise to fight organized groups of cybercriminals. This has created the need for partnerships with private companies specializing in cybersecurity.
Private companies operating in the field of cybersecurity in the public sector have many advantages. They constantly monitor global threats, maintain international networks of experts, and invest in cutting-edge technologies. Such companies have decades of experience working with government bodies in 70 countries worldwide, understanding the specifics of the public sector far better than those who have never encountered bureaucracy and the peculiarities of state administration. More information can be found at: https://dxc.com/industries/public-sector.
These companies help states not merely react to attacks but develop proactive defense. They integrate modern technologies, establish security centers, train civil servants, and develop strategies that account for the peculiarities of specific countries and government bodies. Without such partnerships, public sector cybersecurity would remain a positional game where attackers always have the advantage.
The first and most obvious challenge is underfunding. Imagine you have a budget of 1 million dollars for IT security. But you need to protect thousands of computers, servers, databases, and web portals. What private companies can solve flexibly, the public sector must handle through lengthy tenders and procurements.
The second challenge is a shortage of experts. A competent cybersecurity specialist on the job market is expensive, and working conditions at private companies are often more attractive than in government agencies. Where will young talent choose to work? In a comfortable office with a salary two or three times higher, or in a government institution with average pay? The result is obvious, and state bodies remain with teams of veterans who often fall behind the pace of technological development.
The third challenge is legacy systems. They drag on like an anchor to the past. These systems were often written in programming languages that are no longer needed, run on outdated equipment, and have architectures that do not adapt to modern patches and updates. Yet rewriting them anew remains impossible because they contain critical data, and any downtime would have catastrophic consequences.
The fourth challenge is the human factor. Most successful cyber attacks do not begin with technical vulnerabilities but with the simple "clicking in the wrong place." A civil servant receives an email from the "Personnel Management System" asking to update their password. They follow the link, enter their credentials, and the hacker now has access to their account. This then spreads further throughout the organization. Thus begin the most complex attacks.
The fifth challenge is the weight of potential attacks. Hackers are interested precisely in large, important systems. A small company might get by without a leading cybersecurity specialist, but a government structure serving millions of people does not have that luxury. It becomes a magnet for attacks because the stakes are very high for both attackers and defenders.
Consider what happened in the public sector over the last 10-15 years. Previously, everything was about a reactive approach: we wait for something to happen, then fight the fire, fire someone, and promise it won't happen again. Now everything has changed, and those organizations that have transitioned to preventive thinking are winning.
Examples of successful practices can be found in EU and US countries. Estonia, for instance, has built an e-governance system considered one of the most secure in the world. They use cryptography, multi-factor authentication, and continuous monitoring. Every operation leaves a trace that can be verified. If the system detects unauthorized access even years later, it can recover and certify it. Denmark developed a centralized incident management system for all government bodies. When an attack occurs anywhere, it is immediately transmitted to the center, on-site specialists can receive assistance, and other bodies receive warnings about potential threats.
If you truly want to protect a government system, you must follow verified practices. The first is regular audits. Not just once a year, but continuously. Every quarter, every month, depending on system criticality. An audit is not merely a review of paperwork. It's when a company like DXC arrives with a team of specialists who attempt to penetrate the system as real hackers would. They try to find loopholes and weak points, then report findings, and the team fixes the problems.
The second practice is regular software updates. It sounds simple, but in reality, it is a serious challenge. Each patch requires testing on thousands of computers and servers. Testing may reveal that some legacy software stops working with the new update. Yet failure to implement updates means leaving doors open to attacks.
The third is the principle of minimum access. In simple terms, every person should have access only to what they need to do their job. A clerk working with registrations should not have access to medical data of millions of people. A bus driver should not be a database administrator. If a hacker steals a regular employee's credentials, they will have limited access.
Real cases demonstrate how this works in practice. In the United Kingdom, the Department of Work and Pensions (DWP) entered into multi-year contracts with companies specializing in vulnerability testing. They regularly conduct comprehensive system reviews, essentially posing as hackers. The result is a system that withstands hundreds of attacks per year without compromise. In the Netherlands, the employment service modernized its infrastructure to cloud solutions, which allowed them to update security faster and more efficiently.
Just as ancient cities once built walls against enemies, modern governments are erecting digital fortresses, layer by layer, barrier by barrier, so that an attack requires not only skill but also enormous resources, time, and luck.
Cybersecurity is a constant, continuous process of adaptation, learning, and improvement.
Technology helps, but the human factor remains critical. You need specialists who understand both technical and organizational aspects.
The second component is continuous collaboration between sectors. Private companies have specialization and resources; government bodies have access to critical infrastructure and information about real threats. Government administration should accumulate knowledge, hire private experts to solve specific problems, but not rely entirely on external consultants.
The third component is investment. Building security is not cheap. But it is far cheaper to build it from the start than to later excavate from the ruins of a broken system.
The fourth component is the legislative framework. Regulations, standards, and norms must be clear and consistent. When an organization knows it will be checked for compliance with certain standards, it takes it more seriously. The European General Data Protection Regulation (GDPR) became revolutionary precisely because it established clear rules and strict penalties for violation.
Let us conclude with one thought often forgotten. Citizen trust in a digital state does not begin with beautiful portal designs or rapid request processing. It begins with one simple feeling: a sense of security with every click. When a person enters personal data on a government website, they must be confident that this data is protected maximally.
11 Dec 2025
7 Min
86
10 Dec 2025
6 Min
152