Skip to content

Link

GW IT Staff Host Interactive Table at Midnight Breakfast 2025

Every December GW provides students a stress reducing night of games, treats, and of course breakfast.  GW IT Cybersecurity staff prepared an interactive 'Phishing Awareness' for students.  The team estimates over 300 students participating in f[P]hishing  for cyber risks, threats, and tips and interacting with staff about whether they were 'Phished' (caught by insufficient secure computing) or 'Shook the Hook' (protected by best practice). The team members shared insights, examples, and reinforced best practices.  For anyone who received some strong suggestions during the conversations, please take a look at our resources for additional information on how you can better protect yourself. 

Image from GW Today staff posted on GW Today Midnight Breakfast Photos 

students interacting with cybersecurity staff on best practices for securing themselves online
The annual Midnight Breakfast university tradition offered students a chance to step away from finals prep and recharge while building community.

Please see our events page for more fun events as well as more standard webinars (GW SSO Required.

Take an active role in keeping our university secure! 


GW IT Security Hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

Data Encryption Workshop Announced

Join GW IT cybersecurity staff for a hands-on seminar & workshop covering the importance of data security and an interactive encryption exercise.  All participants will leave with a fully encrypted USB thumb drive and information on how to access the drive as well as how you can encrypt other storage devices. 

Registration is required and space is limited.  Participants must bring a laptop to the session to encrypt the USB drive. 

Please see our Data Encryption Workshop Landing Page for more information including remaining registrations

Take an active role in keeping our university secure! 


GW IT Security Hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

Go deeper into the EDUCAUSE 2026 Top 10

Wednesday, December 03, 2025 | 1:00PM–2:00PM ET

EDUCAUSE Top 10 Report

Join EDUCAUSE for a webinar to reflect on the significance of each issue on the list as well as the larger story it tells about where higher education is heading. The Webinar will share real-world examples of how the items on the Top 10 are impacting your peers at other institutions, and offer recommendations on how the Top 10 can start to shape practice at your institution today. 

Register (external Webinar provided by EDUCAUSE)


GW IT Security Hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

National Cybersecurity Alliance: What Are Common Crypto Scams?

Cryptocurrency investment scams are big business, but you can keep your wallet safe. (5 MIN READ)

Futuristic AI created Pyramid of various crypto currencies

Cryptocurrency sounds like money from the future, but scammers are already here and they’re after your dollars, both real and digital! 

From fake bitcoin giveaways to romance scams to shady investment “opportunities,” crypto scams are exploding in popularity. The FBI reports that Americans lose over $9 billion per year to cryptocurrency investment fraud, and this is likely a low estimate due to underreporting.  

“Cryptocurrency scams are stealing billions and wrecking lives, and it’s not because people are careless or naive," says Erin West, founder of Operation Shamrock, an organization focused on raising awareness about pig butchering scams. "These scams are highly organized, emotionally manipulative, and designed to bypass your defenses. Talking about them openly is how we fight back.”   

However, you can fight back and keep your wallet locked up. Let's learn about the common crypto scams, how they work, and most importantly, how you can avoid them! 

What is a cryptocurrency scam? 

A cryptocurrency scam is any trick or scheme designed to steal your digital currency, like bitcoin or Ethereum. Scammers also attempt to persuade you to hand over personal information or cash under the promise of crypto riches. 

Scammers love crypto because: 

  • Transactions are hard – and often impossible – to reverse. 
  • There’s no central authority to report to. 
  • Lots of people are interested in it but don’t fully understand how it works. 

Now that's a recipe for fraud... 

Common crypto scams to watch out for 

1. Too-good-to-be-true investments 

Someone promises massive returns on your crypto investment. Think: “Double your bitcoin in 24 hours!”   

They offer their services...and then disappear the moment you send your crypto over. 

Red flags: 

  • High-pressure tactics
  • Vague or confusing “white papers
  •  Anonymous founders or fake celebrity endorsements – AI "deepfakes" might even be used!  

2. Heartbreaking romance scams

Scammers establish emotional relationships online, then suddenly claim to have an emergency. “I need help unlocking my wallet,” they say. Or, “Let’s invest together!” 

These scams might unfold over weeks or months. The scammers might even show you doctored charts or apps that make it appear as though you're making money. Pig butchering scams often include a romantic angle.   

Our general advice is to avoid mixing online romance and investing – if you feel pressured to break this rule, you're likely being scammed.  

Red flags: 

  • Your crush won’t video chat 
  • Your crush avoids in-person meetings 
  • Your crush brings up crypto out of nowhere 

3. Phishing with crypto bait 

Fake emails or DMs from “Coinbase” or another crypto platform tell you your wallet is compromised. The link directs you to a fake login page where scammers attempt to steal your credentials.  

Red flags: 

  • Spelling errors or weird URLs 
  • Requests for your private wallet keys or passwords – never share this info! 
  • Messages with a sense of urgency (“Act now or lose everything!”) 

4. Pump and dump coins 

Social media influencers hype up a new altcoin. You buy in to avoid FOMO (that's the "fear of missing out"). The price spikes...then plummets toward zero when the scammers sell off their stash and vanish. 

Red flags: 

  • Unverified claims of partnerships or tech
  • Paid promotions disguised as advice
  • No clear use case for the coin beyond a quick buck for early adopters 

5. Fake crypto apps 

You download a legit-looking crypto app, but you get malware instead. It drains your funds or steals your login info. 

Red flags: 

  • Apps not found in official app stores (like Apple App Store or Google Play) 
  • No reviews or seemingly fake ones 
  • Poor design, broken features, and requests for suspicious app permissions 

How to avoid crypto scams 

While both cryptocurrency and scams are constantly evolving, there are a few habits you can adopt to invest online more safely. Because cryptocurrency is largely unregulated, it is essential to exercise caution with these emerging technologies.  

  1. Do your research before buying or investing in any coin or platform. 
  2. Don’t trust financial advice from strangers on social media or dating apps. 
  3. Use reputable crypto wallets and exchanges – stick to well-established and trusted brands. 
  4. Enable multifactor authentication (MFA) for every account.  
  5. Never share your private key or seed phrase with anyone, ever. 

Never click on links in alarming emails – go to your cryptocurrency account provider’s website directly. Also, don’t download apps from Test Flight (Apply) as those apps are not verified.  

Pro tip: If Tom Hanks DMs you about crypto, it’s not Tom Hanks 

Scammers love impersonating public figures. If someone famous messages you with a crypto giveaway or investment tip, assume it’s fake until proven otherwise. Today, AI is used to make realistic promo videos for scammy cryptos, so, unfortunately, you shouldn't believe your eyes when it comes to cryptocurrency ads.  

What to do if you get scammed 

If you think you’ve fallen for a crypto scam:

  • Report it to the FTC at reportfraud.ftc.gov and the FBI at IC3.
  • File a complaint with the crypto platform like Coinbase or Binance.
  • Document everything, like screenshots, usernames, and wallet addresses.
  • Tell your bank if you paid with a debit or credit card.

Even if you can’t recover your money, reporting helps stop the scam from spreading. 

Invest Safe Online and avoid the scammers 

Crypto is exciting, but scammers are hoping you’re too excited to think clearly. Slow down, double-check, and don’t let the promise of easy money cloud your judgment. 

Want a hot crypto tip? An amazing investment…is your own awareness. 

And if you want more scam-busting tips? Sign up for our newsletter and get cybersecurity info sent straight to your inbox! 

Content Originally Published July 7, 2025 by:
National Cybersecurity Alliance Logohttps://www.staysafeonline.org/


GW IT Security Hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

7 Mobile Security Threats

With increased mobile usage comes increased security threats. Recent statistics show that more than 60% of digital fraud cases are initiated via a mobile device. An unsecured mobile device can become an access point for countless malicious attacks.  Learn more at our Cyber Talk – Lock It Down – Easy Steps to Secure Your Mobile Device Cyber Talk on September 18, 2025 at 10:00.  Register Now for the  Zoom Session

Malicious applications and websites

Just downloading a malicious application or visiting a malicious website may be enough to infect your device and the network it is connected to. The website or application may attempt to install malware on your device, or they may prompt you to allow an install that looks legit but is in truth malicious.

Applications with weak security

Apps with weak security put your data at risk. They do not offer adequate encryption for stored data or data in transit. This can result in identity theft, intellectual property theft, or loss of GW or personal data.

 Data leakage

Data leakage is a slow data breach that can happen in two ways:

  • Physical leakage via sharing or theft of portable storage devices, such as USB drives or external hard drives
  • Electronic leakage when connecting to public WiFi or other malicious or compromised network. With mobile devices, this can be a result of giving apps too many permissions. Review our Device Security Learning resources for more information.

Mobile ransomware

Mobile ransomware does what it sounds like. It will hold your device at ransom, requiring you to pay money or information in exchange for unlocking either the device, certain features, or specific data. You can protect yourself with frequent backups and updates.   

Phishing

Phishing attacks most commonly target mobile devices because people seem more inclined to open emails and messages on a mobile device than on a desktop. Part of the reason is that the smaller screen only shows a partial sender name or subject line, making it harder to identify suspect emails.  See our Phishing – Learning resources for more information.

Unsecured, Public and Spoofed WiFi

Using public Wi-Fi networks presents a risk, as they are often unsecured. This can allow hackers to intercept the data transmitted between your device and the Wi-Fi access point, potentially gaining access to critical personal and business information.  Network spoofing happens when malicious parties set up fake access points that look like a legitimate Wi-Fi network that users can connect to. These traps are set up in high-traffic areas frequented by employees using their mobile devices to connect to work-related applications or systems. A common trick is to offer "free" Wi-Fi if users set up an account first. The goal is to access passwords and other personal data.  See our CyberSafe Travel Resource Page  for information on network security as well as other security tips while traveling around DC or in far away place. 

Identity theft

Since mobile devices often carry personal and financial data, a compromised device can lead to identity theft. Malicious third parties can steal this data electronically or by physically stealing your device.  See our Compromise Recovery – Guide for information on what to do if you think your identity has been stolen.

Quick Tips to Improve Mobile Security

  • Lock screen with PIN/password/biometrics * **
  • Use Strong Passwords and a Password Manager
  • Keeps Apps and Devices Up-to-Date - Enable automatic software updates *
  • Use Two-Factor Authentication (2FA) - Everywhere its available
  • Double-Check That Link Before You Click
  • Review and manage app permissions - read privacy policies *
  • Turn off Wi-Fi/Bluetooth when not in use **
  • Avoid When On Public Wi-Fi - Use VPN if you must access public WiFi **
  • Don't Jailbreak Your iPhone - Install apps only from official stores - read reviews and privacy policies
  • Use secure messaging apps
  • Enable SIM card lock
  • Don't Store Sensitive Info on Your Phone - Especially while traveling and always Use a Passcode
  • Enable Find My Device

 


unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

Then & Now: Online Safety for Older Adults

picture of adults

Older adults are among the most targeted, and most impacted, by online scams. In fact, the FBI reports that Americans over 60 lose more money to cybercrime than any other age group.

Just like locking the front door of your home, taking a few smart safety steps can make all the difference. That’s why we’re excited to announce Then & Now, a new initiative from the National Cybersecurity Alliance to empower older adults and their caregivers with the tools they need to protect themselves online.

Then & Now highlights how threats have changed over time. But with a bit of guidance and a few smart habits, anyone can be safer online with some key practices.

Then & Now features a microsite and easy-to-follow workbook* that covers:

  • Easy steps for securing online accounts with passwords and multifactor authentication
  • Tips to spot common scams
  • Guidance to keep devices updated and protected
  • How-to video guides and quick activities you can practice right away
Deleted:

* GW Cybersecurity Team Note - the workbooks are $5.00 per copy. Workbooks are not required for Microsite activities and content - Jump to microsite

Content Produced by:
NationalCybersecurityAlliance_Logo
 
 

unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

GW IT Risk and Assurance provides various information and resources through workshops and webinars as well as posts to our blog site.  The team is highlighting newly added Blog site resources.  Note some content referenced is hosted on GW Box and only accessible by those with GW Box access.  We hope to add more content sharing options for the wider community soon.

Please visit our resources page for more information about content being shared on GW Box

Quickstart Uploaded - Finding CyberSecurity Awareness Content in Talent@GW

...continue reading "Cybersecurity Training and Awareness Resources"

Information Sharing Through GW Box

GW IT Risk and Assurance provides information and resources through workshops and webinars as well as posts to our blog site.  Below the team highlights resources added to our newly created GW Box awareness repository.  Unfortunately, content hosted on GW Box is only accessible by those with GW Box access.  We hope to add more content sharing options for the wider community soon.

The following items were posted this week:

Cybersecurity Awareness - Quick Guides, Presentations, Documents and Resources (Shared Folder - Requires GW Box Account) 

    • Every effort is made to share content aligned with copyright holders' intended use of the content as handouts and guides for distribution.  Please let us know if we have something incorrectly posted by email infosec@gwu.edu.

Look for update announcements for these other focus areas coming soon!


unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu