Back to All Resources

Essentials of Data Security for Public Entities: Second Edition

Cropped cover image of Essentials of Data Security for Public Entities

Fully Updated and Revised Second Edition

Click Wisely logoSecuring private data is a significant responsibility for local governments. Maintaining data security in the face of real threats, such as threat actors, activists and employee errors, is a challenge that everyone in the organization must work to overcome. “Essentials of Data Security for Public Entities” is a nontechnical handbook for Minnesota local governments to guide them through securing the data and systems they use to carryout their operations and to always Click Wisely.

Damages from data compromises and cyberattacks to a public entity are often costly, both financially and nonmonetarily. Money is required to correct security issues, restore lost or damaged data, handle legal action and pay regulatory fines. The nonfinancial costs to a public entity can be damaging to an organization’s reputation, lowered morale and loss of the public’s trust.

It is best if your organization has a robust data security program and response plan established before an incident occurs. Now is the time to assess how strong your entity’s programs and plans are before an attack or data compromise happens. Using enterprise risk management methods, this guide is designed to assist in your efforts.

Cover of "Essentials of Data Security for Public Entities" second editionGuide to Internal Conversations and Policy, Training Development

Maintaining vigilance and being aware of new threats as they emerge is necessary for everyone within your organization. This handbook is not a technical resource. Rather it offers direction to stimulate conversations among the organization’s leadership and provide them with strategies to help the organization secure private data, whether it is electronic or paper in format.

Note: As threats to data security rapidly evolve and systems used by member organizations are varied, this guide often leaves specifics of technical solutions up to the information technology professionals within the organization.

What Is in the Handbook?

  • New and fully updated and revised chapters to address current data- and cybersecurity issues (see below for list of chapters), such as data management (retention and destruction), vendor contracts, data hosting, remote work, ransomware, email and text message security, artificial intelligence
  • Recommended policies and best practices: The policies provide a standard and expectation of behavior for all employees to meet, while best practices offer standards the organization as a whole can strive to meet
  • Checkups: Questionnaires for each topic that organizations can use to assess how they are doing in meeting best practices. These can be used regularly to keep tabs on how well the organization is achieving its improvement goals
  • Vetted resources to review for continuous and updated best practices
  • Glossary of terms to ensure full understanding of concepts and facilitate conversations with information technology staff

Data Security Is an Entity-wide Effort

This resource should be shared, used and discussed at multiple levels within the organization, including information technology (IT) managers, elected board members, executive directors and administrators, department heads, managers, and others as appropriate (e.g., safety committee).

The Guide’s Chapters

  • Introduction: Everyone Plays a Part in Data- and Cybersecurity
  • Chapter 1: Data- and Cybersecurity Overview
  • Chapter 2: Data Privacy Laws
  • Chapter 3: Data Management
  • Chapter 4: Vendor Contracts
  • Chapter 5: Incident Preparation, Response and Recovery
  • Chapter 6: Malware and Ransomware
  • Chapter 7: Security Patches and Updates
  • Chapter 8: Cloud Data Storage
  • Chapter 9: Secure Physical Access and Data Storage Rooms
  • Chapter 10: Mobile Devices and Remote Work
  • Chapter 11: User Authentication
  • Chapter 12: Social Engineering: Phishing, Misdirected Payment Fraud, Business Email Compromise
  • Chapter 13: Secure Email Practices
  • Chapter 14: Secure Internet Browsing
  • Chapter 15: Training Employees and Officials

Use in Combination with Other MCIT Resources

Page 1 of Cybersecurity Self-assessmentCybersecurity Self-Assessment

This is a broad checklist that an organization uses internally to assist in identifying data security areas it needs to strengthen, including technical solutions.

Front page of Quick Take on Data Security: Email and Data Management script

Quick Takes on Data Security

Short scripts for supervisors to lead employees in a discussion about steps they should be taking to secure the organization’s data and systems. Each script has an employees handout.

 

Against a purple background, a white middle-aged man looks at computer monitor. Text: Don't walk alone at night. Don't give rides to strangers. Be wary of requests in email. You look for shady characters on the streets. But they lurk in emails, too. Fraudulent emails appear to come from a known source making a legitimate request. Take these steps to Click Wisely: Don't click on links in unsolicited emails. Examine the email address, URL and spelling for accuracy. Don't open attachments from unknown senders. Verify purchase requests using known contact on file. Be especially suspicious if the sender is pressing you to act quickly.

Email Security Awareness: Digital Images

The images educate employees about their responsibility for cybersecurity and the simple steps they should take, particularly as it relates to using email.

Topics