Information, Technology & Consulting

Interface

Security 101

Here are some tips for keeping your identity secure and your computer safe:

Got Tech Questions?

The WIC’s got your tech answers!

Located conveniently just upstairs from the Novack Cafe entrance to Baker/Berry Library, the Walk-in-Center (WIC) is your centrally located shop for tech help.

Staffed by students for students, no tech questions are unwelcome. Need help configuring wireless? Wondering how to do backups? Thinking about how slow your computer is running? As students, we had our laptop crash in the middle of a 10-page paper--we know what it feels like when it takes your laptop 30 minutes to truly start. We can help!

Back to School Stats

With fall comes cool, crisp mornings, leaves tumbling to the ground, and a big influx of students and faculty returning to Hanover, or, in the case of the Class of 2021, arriving in town for the first time. Here are some ways ITC “sees” the beginning of the school year.

 

How many Canvas courses published in fall versus summer?

520 in fall, versus 126 in summer

GreenPrint pages printed in fall versus summer?

1,304,431in fall, versus 321,717 in summer

Updated IT Security Guidelines for International Travel

 

Planning to take a trip out of the country? Follow these updated security guidelines for protecting your devices and data when you travel abroad. Contact your IT support team for assistance with implementing these protections.

 

 

Don’t Be Fooled! Protect Yourself and Your Identity

 

According to the US Department of Justice, more than 17 million Americans were victims of identity theft in 2014. EDUCAUSE research shows that 21 percent of respondents to the annual ECAR student study have had an online account hacked, and 14 percent have had a computer, tablet, or smartphone stolen. Online fraud is an ongoing risk. The following tips can help you prevent identity theft.

Security Tips for Traveling at Home and Abroad

We all like to travel with our mobile devices (smartphones, laptops, or tablets) — whether it’s just a trip to Umpleby’s or to a café in Paris. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.

Learn What it Takes to Refuse the Phishing Bait

Cybercriminals know the best strategies for gaining access to your personal information and Dartmouth’s sensitive data. Many of their methods are not technical. They simply manipulate a community member. We’ve already experienced a phishing incident this year, when a phishing email, claiming to be from Dartmouth President Phil Hanlon, was sent to thousands of Dartmouth accounts. Dozens of unsuspecting community members clicked on the message and provided their username/password.

Keep What's Private, Private

There are no true secrets online.

You exist in digital form all over the Internet: It’s important to ensure the digital you matches what you are intending to share. It is also critical to guard your privacy — not only to avoid embarrassment, but also to protect your identity and finances.

You can take specific steps to protect your online information, identity, and privacy:

Use a unique password for each site. Hackers often use previously compromised information to access other sites. Choosing unique passwords keeps that risk to a minimum.

Managing Your Online Reputation

You should understand how to present yourself on social networking sites and how to safeguard your information. What many may consider temporary or fleeting will most likely remain on the Internet forever. As a result, keep these dos and don’ts in mind when sharing online.

Five Steps to Protect Your Data Now

By Dartmouth’s Chief Information Security Officer, Steve Nyman

CNN, Fox, the New York Times and other news outlets report major IT security incidents daily: State-run breaches originate in Russia, China, and even North Korea, while criminal gangs and cyber hacktivists scour the Internet at large.

Is the threat as bad as it seems?

The answer, unfortunately, is YES.

In this vulnerable environment, how can you protect your data?

Here’s a brief checklist:

Pages

Subscribe to RSS - Interface
Close
Information, Technology & Consulting