Section 8 Portals


Visit the Portal


New Applicants


Returning Applicants

Alternative Text
Alternative Text
Section 8 MyHousing Applicant Portal – How to Get Started (for Applicants)
Versión en Español: youtu.be/VUYNs05QdTQ

 

Frequently Asked Questions (FAQs)

NY HCR Applicant Portal FAQ
 

Registration Guide

MyHousing Applicant Portal NY.gov User Registration Guide for Applicants
 

Portal Guide

MyHousing Applicant Portal Applicant Guide


Landlords

Alternative Text
Alternative Text
Section 8 MyHousing Landlord Portal – How to Get Started (For Landlords)
Versión en Español: youtu.be/HcwTQQAPiSs

 

Frequently Asked Questions (FAQs)

NY HCR Landlord Portal FAQ

 

Registration Guide

MyHousing Portal NY.gov User Registration Guide for Landlords


Residents

Alternative Text
Alternative Text
Section 8 MyHousing Resident Portal – How to Get Started (for Residents)
Versión en Español: youtu.be/3HbpiHY13tc

 

Registration and User Guide

MyHousing Portal NY.gov Registration and User Guide for Residents


Common Scams and Cyber Security Threats

From time to time, HCR becomes aware of email scams targeting Section 8 families. To make them appear more credible, they sometimes include the signature lines of actual case managers increasing the risk of families falling victim. A recent scam attempt involved a fraudulent email advising families that they have been approved to rent a unit and directing them to send a security deposit.

Please be assured that HCR takes this issue very seriously, and we hope you will too.

HCR and our Local Administrators will NEVER request that a family submit payments directly to us, whether for security deposits, rent, or any other charges.  

To guide you in determining whether you’ve received a possibly fraudulent message, here’s a quick list of what you need to watch out for and industry best practices to be mindful of:

 

What to Watch For:

  • Unexpected requests for login credentials or payment.
  • Urgent or emotional tones prompting quick action.
  • Slight misspellings in email addresses or URLs.
  • Search engine results that do not link to the expected website.
  • Generic greeting (no name).
  • No direct contact information or signature details.
  • Sender address might be subtly altered (e.g., @acc0untspay.com).
  • Requests for items with financial value without proper protocol.

 

Best Practices:

  • Verify unexpected requests by calling or messaging the sender directly.
  • Hover over links to preview the actual destination before clicking.
  • Report suspicious emails via your email provider’s reporting button.
  • When in doubt, don’t interact—forward the message to the Local Administrator or HCR for review and verification.
  • Take an extra moment to verify before acting can prevent costly attacks.