Interface is an ongoing series of features about information technology at Dartmouth, the people of ITS, and how we work with the college's many information systems. Learn what it's like to be a freshman barred from having a cell phone on a first-year trip. Peek inside the framework of Dartmouth's many, many sites. See how our past experiences inform what we do here.

Wednesday, May 3, 2017 - 3:42pm
traveling with a device


Planning to take a trip out of the country? Follow these updated security guidelines for protecting your devices and data when you travel abroad. Contact your IT support team for assistance with implementing these protections.



Before You Go

  • Back up all data, and take only the minimum data necessary or a clean loaner machine.
  • Work with your IT support team to remove or restrict saved passwords to sensitive or privileged data.
  • Consider whether it’s feasible to use disposable accounts for email, file sharing and any other...
Read more.
Wednesday, March 29, 2017 - 4:08pm
Don't be fooled


According to the US Department of Justice, more than 17 million Americans were victims of identity theft in 2014. EDUCAUSE research shows that 21 percent of respondents to the annual ECAR student study have had an online account hacked, and 14 percent have had a computer, tablet, or smartphone stolen. Online fraud is an ongoing risk. The following tips can help you prevent identity theft.

Educate Yourself:

  • Take ITS Training Modules for Faculty and Staff....
Read more.
Thursday, March 16, 2017 - 9:48am
security travel

We all like to travel with our mobile devices (smartphones, laptops, or tablets) — whether it’s just a trip to Umpleby’s or to a café in Paris. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, photos, videos, location, and other personal and financial data — about ourselves and our friends and family. Following are some ways to protect yourself and others.

Before you go:

If you plan on using Dartmouth’s online resources, learn how to establish a secure connection to Dartmouth’s...

Read more.
Tuesday, February 21, 2017 - 12:38pm
phishing fish

Cybercriminals know the best strategies for gaining access to your personal information and Dartmouth’s sensitive data. Many of their methods are not technical. They simply manipulate a community member. We’ve already experienced a phishing incident this year, when a phishing email, claiming to be from Dartmouth President Phil Hanlon, was sent to thousands of Dartmouth accounts. Dozens of unsuspecting community members clicked on the message and provided their username/password.

According to IBM’s 2014...

Read more.
Tuesday, January 17, 2017 - 1:27pm

There are no true secrets online.

You exist in digital form all over the Internet: It’s important to ensure the digital you matches what you are intending to share. It is also critical to guard your privacy — not only to avoid embarrassment, but also to protect your identity and finances.

You can take specific steps to protect your online information, identity, and privacy:

Use a unique password for each site. Hackers often use previously compromised information to access other sites. Choosing unique passwords keeps that risk to a minimum.


Read more.
Thursday, December 8, 2016 - 11:15am
shamed guy

You should understand how to present yourself on social networking sites and how to safeguard your information. What many may consider temporary or fleeting will most likely remain on the Internet forever. As a result, keep these dos and don’ts in mind when sharing online.


  • Ask questions about who can access the information you are posting online, who controls and owns the information, and what is shared with third party.
  • Maintain a backup of the content you post on professional networking sites (e.g., LinkedIn).
  • Understand the default privacy...
Read more.
Wednesday, October 5, 2016 - 1:26pm
data protect

By Dartmouth’s Chief Information Security Officer, Steve Nyman

CNN, Fox, the New York Times and other news outlets report major IT security incidents daily: State-run breaches originate in Russia, China, and even North Korea, while criminal gangs and cyber hacktivists scour the Internet at large.

Is the threat as bad as it seems?

The answer, unfortunately, is YES.

In this vulnerable environment, how can you protect your data?

Here’s a brief checklist:

  1. Make sure your computer is configured with active antivirus software and is...
Read more.
Monday, September 19, 2016 - 2:59pm
social media

I work as a social media manager, curating social media accounts for two businesses in addition to my own personal accounts. In all honesty, when I got these jobs I was probably not qualified for them. I thought then that maintaining my own social media presence was sufficient training for managing business accounts. After getting the jobs, I realized that social media platforms are entirely different when used as business tools. Making these business’ social media presences successful took time and research.

Here are a few of the steps I took to get these businesses hundreds of...

Read more.
Wednesday, September 14, 2016 - 1:43pm
National Cyber Security Month

For over a decade, colleges and universities have promoted National Cyber Security Awareness Month (NCSAM) each October as part of a collaborative effort to ensure everyone has the resources they need to stay safe online.

Did you know?

  • 93 percent  of Americans believe their online actions can help make the web safer for everyone.
  • However, 28 percent of Americans say they lack knowledge about ways to stay safer online.

It is important for each of us to be aware of the increasing security risks of mobile...

Read more.
Thursday, September 1, 2016 - 9:21am
Canvas logo

If you’ve taken a break from using Canvas during the summer, here are highlights of some of the most important new features added to Canvas in the past few months:

April: New option for assignments: anonymous peer reviews

June: Canvas got a new look: new user interface


  • Streamlined grading:...
Read more.


Information Technology Services