Ways to Protect Yourself Online

Stay Safe with These Cybersecurity Best Practices
Increasingly, there are cyberattacks including phishing attempts aimed at stealing personal information, and efforts to install malicious software (malware) on electronic devices. Cyberattacks can lead to serious consequences, including data breaches, disruptions to academic and administrative operations, and personal financial loss.

To help safeguard yourself and our community, please take a moment to review the following tips for identifying cyber threats and adopting best practices, whether you are working, studying, or browsing from home or campus:

Use the University Tools Safely

  • Email: Always use your official university email for work-related communication.
  • Cloud Services: Store and share data using approved tools like Google Drive, OneDrive, or Box with multi-factor authentication (MFA).
  • Avoid using or downloading any free non-approved software. Should other software be required, please consult with the IT Help Center guqhelpcenter@georgetown.edu.

Password & Access Hygiene

  • Create strong, unique passwords for each system or service.
  • Turn on multi-factor authentication (MFA) wherever available.
  • Never share your login credentials, not even with the IT support.
  • Use strong passcodes or biometric security (Face ID, fingerprint).
  • Use password managers to store login credentials securely.

Be Alert to Phishing & Scams

  • Don’t click suspicious links or attachments.
  • Look for unusual sender addresses and poor grammar.
  • Report suspicious emails to IT immediately by clicking on the Fish icon in Gmail.
  • Avoid public Wi-Fi for sensitive transactions, use your mobile data as hotspot.
  • Look for the padlock icon (https://) when entering personal information online.
  • Be cautious of too-good-to-be-true offers or urgent action emails/texts.

Bank Fraud Cyberattacks

  • Banking frauds: The bank will not ask for personal information via phone. If you get a call or message from someone claiming to be your bank, go to a branch or call the phone number on the back of your bank card to confirm it is a valid request.
  • Unsolicited communications: Be wary of unsolicited emails, calls, or text messages from unknown senders, particularly those requesting sensitive information or urging immediate action.
  • Sender identities: Before responding to any communication, carefully verify the sender’s identity and authenticity. Look for signs of suspicious activity, such as unfamiliar email addresses or phone numbers.
  • Sensitive information: Refrain from sharing sensitive information such as passwords, financial details, or personal ID numbers (e.g. QID or US Social Security) via email or text messages. If it is absolutely necessary to share this type of information, use a secure channel after verifying recipient identity.

Stay Updated

  • Keep your university-issued and personal devices updated with the latest security patches.
  • Restart your computer regularly to complete security updates.

    For more comprehensive information on cybersecurity, how to safeguard Georgetown data, and personal security measures, please click here. By staying informed and adhering to best practices, we can collectively strengthen our cybersecurity posture and safeguard against potential threats.