Published 1/30/2025 by National Cybersecurity Alliance - 4 min read - full article
Excerpt - Tax season brings enough stress without adding scammers to the mix. But the reality is that criminals ramp up attacks in the first few months of the year, often impersonating the IRS or trusted services like H&R Block and TurboTax.
By adopting smart security habits, you can protect your data and ensure your tax refund goes where it belongs—your bank account.
This content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.
IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu
GW IT Risk and Assurance provides information and resources through workshops and webinars as well as posts to our blog site. The team is highlighting travel considerations in this post as everyone begins travel planning.
Travelers rely on technology to enhance vacation and travel experiences including finding entertainment, lodging and dining, sharing photos online, and the many other benefits of being connected. As you embark upon your next adventure, increase your safety by following simple practices to keep your vacation plans free from cybercriminal meddling. To assist in your efforts, the team has prepared the following resources:
The team has also compiled a Cyber Secure Traveling Resource Page noting security risks and mitigation recommendations to consider prior to and while traveling.
This content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.
IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu
Use secondary channels and/or two-factor authentication to verify requests for changes in account information.
Use unique passwords/passphrases. Make sure to use a unique password for every online service you use and try to change your passwords/passphrases periodically.
Ensure the URL in emails is associated with the business/individual it claims to be from.
Be alert to hyperlinks that may contain misspellings of the actual domain name.
Refrain from supplying login credentials or personal identifiable information (PII) of any sort via email. Be aware that many emails requesting your PII may appear to be legitimate.
Verify the email address used to send emails, especially when using a mobile or handheld device, by ensuring the sender's address appears to match who it is coming from.
Monitor your personal financial accounts on a regular basis for irregularities, such as missing deposits.
This content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.
IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu
Securing Home Networks – Overview and Supporting Materials
GW IT Risk and Assurance provides various information and resources through workshops and webinars as well as posts to our blog site. The team has compiled an overview of home network configuration focus areas and recommended changes. This summary aligns to the Cybersecurity@Home Cyber Talk presentation. Additional information is available on our in-depth Cybersecurity@Home page
Increasing Scope and Complexity of Home Networks
Increased Scope of Home Network Vulnerabilities
Internet Connectivity Creates Potential Global Access to Home Networks through Gateways or Routers
Home network front door to the globe
Threat – devices are targeted directly; potentially providing attackers access to in-home devices, data, network activity
Wireless Services Expose Home Network Outdoors
Most home networks have WiFi services enabled
Threat – attackers and even pranksters can attack your network wirelessly from near your home
Securing Gateways / Routers
Tom's Guide - Router Security
Change administrative credentials from default username and password
Set strong connection password (different from admin)
Enable WPA2 encryption or ideally WPA3 standard, if available, avoid WEP.
Change network name, or SSID, default names provide attackers information
Don’t use identifying information (names, street or apartment numbers)
Investigate / Set Parental Controls – applied to all or select devices
Configure Guest Network
Separate guest access from primary home network; could be used for some smart-home or IoT devices
Use 5GHz band Wi-Fi not 2.4GHz band (all devices must support 5GHz)
5GHz band signal travels less distance than the 2.4GHz band
Disable Wi-Fi Protected Setup, if possible
this capability can expedite initial setup, disable when not connecting devices.
Disable remote administration of firewall and router devices if not required.
Internet of Things (IoT) Safeguards for Home Network Security
Research Known Vulnerabilities – Google Before Purchasing
Learn Device [Security] Capabilities During [Before Purchase and] Setup
Buy Encrypted, Secure Versions Of Devices
Review Security Standards Prior To Purchase
Question Overly Complex or Intrusive Devices
Securing IoT Solutions
Change Default Passwords and Enable Multifactor Authentication
Establish Separate Passwords and Networks
Review And Limit Data and Service Access
Disable Features You Don’t Use – Does everything need connectivity?
Maintaining Secure IoT Solutions
Monitor Network Traffic
Ensure Awareness Of All Home Connected Devices
Update Firmware Regularly
Use a personal VPN on connected computers – consider a VPN for Home Network
Securing Home Networks – Parental Controls
There have been parental controls for television content for many years. Similar in context to television parental controls, both devices and your home network have settings for parental controls. This post addresses resources available from service providers and vendors.
DMV Internet Service Providers (ISPs) – Parental Control Resources
Internet Service Providers (ISPs) are core to internet connectivity and network security at home. The following information focuses on Parental Control solutions available from the primary internet service providers in the DC, Maryland, and Virginia area. The following resources are specific to implementing Parental Controls on ISP provided gateways (also known as routers).
Note – some ISPs provide additional software to subscribers. For example, Cox provides a Cox Security Suite that offers additional controls. ISPs may also provide device security software such as antivirus or antimalware.
More information available on the CyberSecurity@Home page and through our Webinar offerings.
This content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.
IT Support Questions? For IT support, please contact the Information Technology Support Center at 202-994-GWIT (4948), ithelp[@]gwu.edu, or visit ithelp.gwu.edu