Information, Technology & Consulting


Interface is an ongoing series of features about information technology at Dartmouth, the people of ITS, and how we work with the college's many information systems. Learn what it's like to be a freshman barred from having a cell phone on a first-year trip. Peek inside the framework of Dartmouth's many, many sites. See how our past experiences inform what we do here.

Thursday, September 7, 2017 - 9:45am
photo of student studying in Orozco Room

Here are some tips for keeping your identity secure and your computer safe:

  1. Don’t get Phished! Be careful what you click. It might look like a reasonable link, but give it a second look. Is someone asking for your password? Even for you to just type it? Don’t do it!
  2. Update, Update, Update! The easiest step you can take is keep your computer and cell phone up to date. Do it automatically and let your hardware look out for you. Don’t know how to set up automatic updating? Come see us in the Walk-in-Center (WIC) in 178J Baker/Berry.
  3. Don’t share your identity...
Read more.
Thursday, September 7, 2017 - 9:06am

The WIC’s got your tech answers!

Located conveniently just upstairs from the Novack Cafe entrance to Baker/Berry Library, the Walk-in-Center (WIC) is your centrally located shop for tech help.

Staffed by students for students, no tech questions are unwelcome. Need help configuring wireless? Wondering how to do backups? Thinking about how slow your computer is running? As students, we had our laptop crash in the middle of a 10-page paper--we know what it feels like when it takes your laptop 30 minutes to truly start. We can help!

At the WIC, you can come in and we’ll...

Read more.
Friday, September 1, 2017 - 2:39pm
fall facts

With fall comes cool, crisp mornings, leaves tumbling to the ground, and a big influx of students and faculty returning to Hanover, or, in the case of the Class of 2021, arriving in town for the first time. Here are some ways ITC “sees” the beginning of the school year.


How many Canvas courses published in fall versus summer?

520 in fall, versus 126 in summer

GreenPrint pages printed in fall versus summer?

1,304,431in fall, versus 321,717 in summer

How many wireless devices are on campus on an...

Read more.
Wednesday, May 3, 2017 - 3:42pm
traveling with a device


Planning to take a trip out of the country? Follow these updated security guidelines for protecting your devices and data when you travel abroad. Contact your IT support team for assistance with implementing these protections.



Before You Go

  • Back up all data, and take only the minimum data necessary or a clean loaner machine.
  • Work with your IT support team to remove or restrict saved passwords to sensitive or privileged data.
  • Consider whether it’s feasible to use disposable accounts for email, file sharing and any other...
Read more.
Wednesday, March 29, 2017 - 4:08pm
Don't be fooled


According to the US Department of Justice, more than 17 million Americans were victims of identity theft in 2014. EDUCAUSE research shows that 21 percent of respondents to the annual ECAR student study have had an online account hacked, and 14 percent have had a computer, tablet, or smartphone stolen. Online fraud is an ongoing risk. The following tips can help you prevent identity theft.

Educate Yourself:

  • Take ITS Training Modules for Faculty and Staff....
Read more.
Thursday, March 16, 2017 - 9:48am
security travel

We all like to travel with our mobile devices (smartphones, laptops, or tablets) — whether it’s just a trip to Umpleby’s or to a café in Paris. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.

Before you go:

If you plan on using Dartmouth’s online resources, learn how to establish a secure connection to Dartmouth’s...

Read more.
Tuesday, February 21, 2017 - 12:38pm
phishing fish

Cybercriminals know the best strategies for gaining access to your personal information and Dartmouth’s sensitive data. Many of their methods are not technical. They simply manipulate a community member. We’ve already experienced a phishing incident this year, when a phishing email, claiming to be from Dartmouth President Phil Hanlon, was sent to thousands of Dartmouth accounts. Dozens of unsuspecting community members clicked on the message and provided their username/password.

According to IBM’s 2014...

Read more.
Tuesday, January 17, 2017 - 1:27pm

There are no true secrets online.

You exist in digital form all over the Internet: It’s important to ensure the digital you matches what you are intending to share. It is also critical to guard your privacy — not only to avoid embarrassment, but also to protect your identity and finances.

You can take specific steps to protect your online information, identity, and privacy:

Use a unique password for each site. Hackers often use previously compromised information to access other sites. Choosing unique passwords keeps that risk to a minimum.


Read more.
Thursday, December 8, 2016 - 11:15am
shamed guy

You should understand how to present yourself on social networking sites and how to safeguard your information. What many may consider temporary or fleeting will most likely remain on the Internet forever. As a result, keep these dos and don’ts in mind when sharing online.


  • Ask questions about who can access the information you are posting online, who controls and owns the information, and what is shared with third party.
  • Maintain a backup of the content you post on professional networking sites (e.g., LinkedIn).
  • Understand the default privacy...
Read more.
Wednesday, October 5, 2016 - 1:26pm
data protect

By Dartmouth’s Chief Information Security Officer, Steve Nyman

CNN, Fox, the New York Times and other news outlets report major IT security incidents daily: State-run breaches originate in Russia, China, and even North Korea, while criminal gangs and cyber hacktivists scour the Internet at large.

Is the threat as bad as it seems?

The answer, unfortunately, is YES.

In this vulnerable environment, how can you protect your data?

Here’s a brief checklist:

  1. Make sure your computer is configured with active antivirus software and is...
Read more.


Information, Technology & Consulting