Welcome to DoIT’s Cybersecurity web page. This site provides information for individuals, families, businesses and schools to find materials to help increase their general cybersecurity knowledge. Here you will find videos, newsletters, presentations, useful links and a variety of other resources all housed under one easy to navigate page.
This year, authorities are warning about a massive wave of W-2 tax form phishing scams. Cyber criminals are sending "spoofed" emails that look like they come from the CEO or another C-level executive and ask for a PDF with the W-2 tax information of all employees. The W-2's have all the information needed to file fraudulent tax returns and steal anyone's identity.
Here are five steps to prevent an incredible amount of hassle and possible damage:
- If you receive any email requesting any kind of W-2 tax information, pick up the phone and verify that request before you email anything to anybody.
- File your taxes at the state and federal level as quickly as you can, or file for an October 16 extension early, before the bad guys can file a bogus claim.
- Consider filing form 14039 and request an IP PIN from the government. Form 14039 requires you to state you believe you are likely to be a victim of identity fraud. Even if cyber criminals haven't tried to file a bogus tax return in your name, virtually every American's data has been stolen which can lead to your identity being stolen.
- Every 4 months, get a free once-a-year credit report from the three major credit bureaus. Get them on your calendar (cycle through them) and dispute any unauthorized activity.
- Place a "security freeze" or "credit freeze" on your files with all three credit bureaus to prevent ID thieves from assuming your identitity and open up a line of credit in your name.
This time of year, it is more important than ever to Think Before You Click!
What is Phishing?
The term "Phishing" is not referring to an activity that involves a pole and a lake! Phishing (pronounced fishing) is a type of deception or fraud that uses e-mail messages, websites or phone calls to dishonestly exploit sensitive information from you OR install malicious software on your computer. Any time of year is "Phishing" season. Explore:
- The "Phishing Emails and You" newsletter
- Flyers on Phishing and Smishing
- The first video in the Ask a Hacker series on creating better passwords
Avoid being Phished!