Skip to content

Link

7 Mobile Security Threats

With increased mobile usage comes increased security threats. Recent statistics show that more than 60% of digital fraud cases are initiated via a mobile device. An unsecured mobile device can become an access point for countless malicious attacks.  Learn more at our Cyber Talk – Lock It Down – Easy Steps to Secure Your Mobile Device Cyber Talk on September 18, 2025 at 10:00.  Register Now for the  Zoom Session

Malicious applications and websites

Just downloading a malicious application or visiting a malicious website may be enough to infect your device and the network it is connected to. The website or application may attempt to install malware on your device, or they may prompt you to allow an install that looks legit but is in truth malicious.

Applications with weak security

Apps with weak security put your data at risk. They do not offer adequate encryption for stored data or data in transit. This can result in identity theft, intellectual property theft, or loss of GW or personal data.

 Data leakage

Data leakage is a slow data breach that can happen in two ways:

  • Physical leakage via sharing or theft of portable storage devices, such as USB drives or external hard drives
  • Electronic leakage when connecting to public WiFi or other malicious or compromised network. With mobile devices, this can be a result of giving apps too many permissions. Review our Device Security Learning resources for more information.

Mobile ransomware

Mobile ransomware does what it sounds like. It will hold your device at ransom, requiring you to pay money or information in exchange for unlocking either the device, certain features, or specific data. You can protect yourself with frequent backups and updates.   

Phishing

Phishing attacks most commonly target mobile devices because people seem more inclined to open emails and messages on a mobile device than on a desktop. Part of the reason is that the smaller screen only shows a partial sender name or subject line, making it harder to identify suspect emails.  See our Phishing – Learning resources for more information.

Unsecured, Public and Spoofed WiFi

Using public Wi-Fi networks presents a risk, as they are often unsecured. This can allow hackers to intercept the data transmitted between your device and the Wi-Fi access point, potentially gaining access to critical personal and business information.  Network spoofing happens when malicious parties set up fake access points that look like a legitimate Wi-Fi network that users can connect to. These traps are set up in high-traffic areas frequented by employees using their mobile devices to connect to work-related applications or systems. A common trick is to offer "free" Wi-Fi if users set up an account first. The goal is to access passwords and other personal data.  See our CyberSafe Travel Resource Page  for information on network security as well as other security tips while traveling around DC or in far away place. 

Identity theft

Since mobile devices often carry personal and financial data, a compromised device can lead to identity theft. Malicious third parties can steal this data electronically or by physically stealing your device.  See our Compromise Recovery – Guide for information on what to do if you think your identity has been stolen.

Quick Tips to Improve Mobile Security

  • Lock screen with PIN/password/biometrics * **
  • Use Strong Passwords and a Password Manager
  • Keeps Apps and Devices Up-to-Date - Enable automatic software updates *
  • Use Two-Factor Authentication (2FA) - Everywhere its available
  • Double-Check That Link Before You Click
  • Review and manage app permissions - read privacy policies *
  • Turn off Wi-Fi/Bluetooth when not in use **
  • Avoid When On Public Wi-Fi - Use VPN if you must access public WiFi **
  • Don't Jailbreak Your iPhone - Install apps only from official stores - read reviews and privacy policies
  • Use secure messaging apps
  • Enable SIM card lock
  • Don't Store Sensitive Info on Your Phone - Especially while traveling and always Use a Passcode
  • Enable Find My Device

 


unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

Then & Now: Online Safety for Older Adults

picture of adults

Older adults are among the most targeted, and most impacted, by online scams. In fact, the FBI reports that Americans over 60 lose more money to cybercrime than any other age group.

Just like locking the front door of your home, taking a few smart safety steps can make all the difference. That’s why we’re excited to announce Then & Now, a new initiative from the National Cybersecurity Alliance to empower older adults and their caregivers with the tools they need to protect themselves online.

Then & Now highlights how threats have changed over time. But with a bit of guidance and a few smart habits, anyone can be safer online with some key practices.

Then & Now features a microsite and easy-to-follow workbook* that covers:

  • Easy steps for securing online accounts with passwords and multifactor authentication
  • Tips to spot common scams
  • Guidance to keep devices updated and protected
  • How-to video guides and quick activities you can practice right away
Deleted:

* GW Cybersecurity Team Note - the workbooks are $5.00 per copy. Workbooks are not required for Microsite activities and content - Jump to microsite

Content Produced by:
NationalCybersecurityAlliance_Logo
 
 

unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

Cybersecurity Tips for College Students
Stay Safe Online News

college students 600x300

Between classes, clubs, jobs, homework, and the occasional nap, today's college students juggle a lot. But there’s another task every student should keep on their list: cybersecurity. Whether you’re sharing streaming service passwords with your dormmates (don't do that) or submitting assignments at 2 a.m., you can be a CyberSafe GW student by adopting a few behaviors.

Read cybersecurity tips for college students
(a National Cybersecurity Alliance Resource)

 

unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

Elmo's Account Hacked: What We Know - Newsweek

Elmo's account on X, formerly Twitter, has been hacked, according to Sesame Workshop, the nonprofit organization behind Sesame Street, per The New York Times.

Elmo says: Enable Two Factor on all social media accounts!

GW Cybersecurity Password Resource Page


unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.


 

 

Link

Password Reminder

We have heard this before, but it is important to remember that unique passwords are critically important to being CyberSafe.  In a recent example, it appears that the breach of McDonalds hiring data (64 million applicants) was caused by either a default or temporary password.

The McHire platform, Carroll explains, enables restaurant owners to log in to view applications, and forces Single Sign-On (SSO) for McDonald’s. However, a sign-in page for Paradox team members allowed logging into a ‘123456’ user account, with the ‘123456’ password. (Security Week 7/11/2025)

GW Cybersecurity Password Resource Page


unofficial GW hippo mascot holding a lockThis content is presented by the GW IT Cybersecurity Risk and Assurance team. #SecuringGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu.