Archive for October, 2015

#WhatsUpAtGRACE October 27, 2015

Click to read the #WhatsUpAtGRACE Oct 27, 2015 newsletter. Each issue of #WhatsUp contains many hyperlinks so that you can receive additional information about each topic. A quick summary of what you will find:

  • A reminder that today is the last day to order hot lunch for November AND December
  • Information about The Sound of Music information meeting and auditions
  • Winter Sports try out dates (listed in Instant Replay)
  • A recap of community service day
  • Information on when and where you can see GRACE athletic teams competing in NCISAA state competitions
  • An update on the GRACE Garden
  • Links to previous GRACE News articles and events (listed in Instant Replay)

Don’t forget to look at GRACE News and the GRACE Calendar on the website for up-to-date information on upcoming events. You can also Subscribe to GRACE News and receive new postings via email.

NCSAM: When Free Isn’t Free

Nearly all of us–including me, Daniel–use social media, apps, and play games online that are advertised as being free for anyone to sign up and enjoy. But how do these sites and applications receive funding? What if free isn’t really free?

Many websites and applications that are seemingly free utilize information gathering software to mine your profile and internet history to collect information about you: your preferences, hobbies, location, and even data on other websites that you routinely visit. This information can then be sold to advertisers and 3rd party websites. Because of this, most social media sites such as Facebook and Twitter would like your profile and posts to be as public as possible – that way they can provide more information to advertisers and application developers, and turn a larger profit.

With this in mind, what are some ways to protect yourself?

First, before signing up for a social media website or application, read the terms of service before agreeing to them. It sounds simple, but I would argue that most people give these binding documents a quick scan before agreeing to them, without checking to see what they actually say. Each service (and sometimes even each application, game, or individual Facebook page) has varying degrees of what it means to keep information “private,” but each site’s definition should be found within the terms of service. This goes for online games as well. Users should be diligent in reading a game’s terms of service because many online games want to scavenge your personal information to then sell to advertisers and make money, just like social media websites.

Another action to take is logging out of social media when you are doing other things online. Most social media platforms gather information beyond their borders, under the pretense of learning how to provide you with better choices. However, some sites can mine for your personal information and browsing preferences when you are not even using the website.

Like anything else, it is important to be mindful of all aspects of social media as we dive into these new technologies. This includes knowing why and how websites can suggest pop-up advertisements that appear related to websites you were just visiting, and knowing that even if a website or application is advertised as being “free to use,” that it is not always the case. Lastly, and most importantly, there are steps you can take to protect yourself from this sort of data mining.

NCSAM: Cyberbullying (and a book review)

Unfortunately, one way the internet can be unsafe for our students is if a student is being cyberbullied. I (Laura) definitely do not know how to make every internet interaction positive, but I have read one book that I want to share with you that has some good information and suggestions.

The book is Sticks and Stones: Defeating the Culture of Bullying and Rediscovering the Power of Character and Empathy by Emily Bazelon. I don’t endorse everything in the book, but it does raise some really good points.

Here’s why I like this book:

  1. It truthfully examines facts. Is there really more bullying online than there was before? How has bullying changed in the online world, and how is it the same? One of my favorite things about this book was its commitment to seeing both sides of a story and its anti-sensationalist tone.
  2. It looks at bullying from a student’s perspective. This means that sometimes what adults see as bullying, students see as “drama” (52). This difference in perspective means that adults treat the situation differently (and more seriously) than students see it, which can make it difficult to end. This leads to point 3:
  3. It looks at solutions frankly. Bullying is not a problem that a one day seminar can completely eradicate. (This should not be a surprise to Christians who believe that every human being is sinful.) In fact, the book talks about how adults often make things worse for students who are being bullied (54). That’s a sobering thought for parents and educators.
  4. It looks at solutions that work. The end of the book talks about what does actually make a difference in bullying (i.e. focused, long-term interventions) and presents case studies of schools who have decreased their bullying.

Bazelon, Emily. Sticks and Stones: Defeating the Culture of Bullying and Rediscovering the
Power of Character and Empathy. New York City: Random House, 2013. Print. (Also available as a Kindle or Nook book)

NCSAM: Strong Password Tips

Continuing our posts on cybersecurity for National Cyber Security Awareness Month, Tomeka, our TK-6th grade Technology Teacher and Technology Integration Specialist, shares with us about passwords:

Why are passwords important in the security of your computer?

Passwords provide the first level of protection for your computer. The stronger your password the harder it is for hackers and malicious software to infiltrate. You should change your password at least twice a year and NEVER give out your password. The secret is to make passwords memorable but hard to guess.

Tips to a strong password:

  • Is at least 8 characters long
  • Does not contain username, real name, or company name
  • Does not contain a complete word
  • Significantly different from previous passwords
  • Should contain one character from each of the following categories (uppercase letters, lowercase, numbers, and symbols)

#WhatsUpAtGRACE October 20, 2015

Click to read the #WhatsUpAtGRACE Oct 20, 2015 newsletter. Each issue of #WhatsUp contains many hyperlinks so that you can receive additional information about each topic. A quick summary of what you will find:

  • A reminder that all day today 20% of your Chick-Fil-A Crossroads Plaza purchases are donated to GRACE when you present this flyer
  • First Quarter Honor Roll
  • Information on Teen Read Week on the Crossroads Campus
  • Pictures of TK Firefighters
  • A recap of the book fair recently held on the Raleigh (TK-6th Grade) Campus
  • A request for individually wrapped candy to be donated for the Cary Christmas Parade
  • A link to detailed re-enrollment and enrollment information (listed in Instant Replay)
  • A replay of news and links from previous newsletters
  • A reminder of the high school missions trip information meeting after school on October 21st (listed in Instant Replay)

Don’t forget to look at GRACE News and the GRACE Calendar on the website for up-to-date information on upcoming events. You can also Subscribe to GRACE News and receive new postings via email.

Eagles Wall Of Fame

Stop by the game entrance of the gymnasium to see the the Eagles Wall of Fame honoring our alumni athletes. Fourteen former Eagles in seven different sports are featured on the wall.

1013 Eagles Wall of Fame 01

  • Class of 2010, Kenny Yacynych, US Military Academy at West Point / Swimming
  • Class of 2012, Keerthi Boru, Carnegie Mellon University / Basketball
  • Class of 2012, Anna Green, Emory & Henry College  / Basketball
  • Class of 2013, Lydia Rooth, Southeastern University / Volleyball
  • Class of 2013, Michael Taylor, Randolph Macon College / Basketball
  • Class of 2014, Jacob Cole, Luther College / Swimming
  • Class of 2014, Josh Greene, NC Central University / Baseball
  • Class of 2014, Michael Hegar, Washington & Lee University / Basketball
  • Class of 2014, Harrison Huntley, Charleston Southern University / Cross Country, Track & Field
  • Class of 2014, Ashlyn Kent, Montreat College / Volleyball
  • Class of 2014, Katarina Pibl, Emory University / Soccer
  • Class of 2015, Alex Dolwick, Washington & Lee University / Cross Country
  • Class of 2015, David McCullen, American College at Marbella, Spain / Soccer
  • Class of 2015, Alex Moore, Randolph Macon College / Basketball

Future Wall of Fame Members

  • Class of 2016, Maureen Fitts, Mars Hill University / Swimming (not yet pictured)
  • Class of 2016, Carol-Anne Obusek, High Point University, / Basketball (not yet pictured)

#WhatsUpAtGRACE October 13, 2015

Click to read the #WhatsUpAtGRACE Oct 13, 2015 newsletter. Each issue of #WhatsUp contains many hyperlinks so that you can receive additional information about each topic. A quick summary of what you will find:

  • Upcoming events for students and parents (FCA, #YouthCulture, and Chick-Fil-A Day)
  • The grade that recently won 1st place in a local competition
  • Information about the GRACE Garden
  • The list of students whose artwork will be on display at the NC State Fair
  • A request for individually wrapped candy to be donated for the Cary Christmas Parade
  • The debut of the Eagles Wall of Fame, our tribute to GRACE alumni athletes
  • A reminder to Crossroads Campus students about the dress code guidelines for sweatshirts
  • Information about a canned food drive sponsored by the GRACE cheerleaders
  • A link to detailed re-enrollment and enrollment information (listed in Instant Replay)
  • The link to watch the Grandparent’s Day recording (listed in Instant Replay)
  • A replay of news and links from previous newsletters

Don’t forget to look at GRACE News and the GRACE Calendar on the website for up-to-date information on upcoming events. You can also Subscribe to GRACE News and receive new postings via email.

#WhatsUpAtGRACE October 6, 2015

Click to read the #WhatsUpAtGRACE Oct 6, 2015 newsletter. Each issue of #WhatsUp contains many hyperlinks so that you can receive additional information about each topic. A quick summary of what you will find:

  • Upcoming fellowship events for students, parents and grandparents
  • The link to watch the Grandparent’s Day program online
  • Important re-enrollment information
  • Information about this week’s Book Fair on the TK-6th Grade Campus
  • Information about the parent’s meeting to discuss high school missions trips
  • Community Service opportunities
  • A reminder that the grades portion of RenWeb will be turned off this week
  • A replay of news and links from previous newsletters

Don’t forget to look at GRACE News and  the GRACE Calendar on the website for up-to-date information on upcoming events.  You can also Subscribe to GRACE News and receive new postings via email.

The “Circle of Trust” Illusion in Digital Communication

The security world often refers to the “circle of trust.” In my own understanding of this phrase, there are various factors which help define what the “circle of trust” actually consists of. It may represent any of the following:

  1. A hierarchical relationship (like a boss to a subordinate)
  2. A mutual situation (like coworkers)
  3. A mutual trust relationship (like marriage)
  4. Blood relationships (relatives)
  5. Selective relationships (like friendship)
  6. I’m not sure if this list is all inclusive, but I think many close relationships can be summed up in the list above.

When we talk about these relationships, we know that they are strongest when they can be observed physically. When we see a boss giving instructions to an employee face to face, we can observe the serious tone of a communication. When we see camaraderie between coworkers, we can easily get a sense of common purpose.

However, the trust seems to break down when we try to shove these relationships into data. We turn these highly valued relationships into SMS texts, emails, instant messaging, twitter posts, and every other form of electronic communication. When I receive a text from a friend, I have to imagine the message in the context of that friendship. It is like the fabric of what makes these relationships real becomes some sort of illusion and I have to use my imagination in conjunction with the data in order to interpret context.

So, here’s what happens. A boss goes on a valued business trip, he/she sends a message to a subordinate approving a bank transfer of millions of dollars. The message is clear and the dollar amount is precise, right down to the penny. The subordinate recognizes the tone and nature of the communication and doesn’t flinch on the amount of money and therefore approves the bank transfer. The problem is, the boss never sent the message. The message was sent by someone socially engineering the subordinate into approving this transfer. Once the money is transferred, it is immediately dispersed to other bank accounts making it impossible to recover the money.

Is the story fact or fiction? The story is fact. A wireless company recently made this mistake. The mistake cannot be pegged solely on the subordinate. The mistake can definitely be attributed to the casual nature of digital communication that many of us have fallen prey to. All of us can say that it would be so easy for the subordinate to place a simple phone call and make sure the request was valid. And, though we would be right, we often make similar mistakes on a daily basis. Sometimes we don’t even know we are making them.

Maybe we aren’t losing millions of dollars, but we are losing precious communication skills.

What does all this have to do with circles of trust? The fact is, a circle of trust means nothing if we don’t clearly communicate with each other. If someone in your circle of trust sends you an attachment, do you blindly open it? What about if they send you a text? Do you blindly rely on its contents? Have you fallen into the trap of believing that your email, SMS texts, and other forms of digital communication are secure? That is the illusion.

To combat the illusion of trust, you can do some simple things.

  1. When receiving a communication you aren’t 100 percent clear about, discuss it directly with sender for clarification (phone or even video chat will suffice).
  2. Temper the amount of confidential or sensitive information you include in your digital communications. Don’t just attach all and send… that’s a recipe for disaster
  3. Always look for your domain name in email communications. In other words, think twice before ever responding to a fellow employee or boss outside of their work-sanctioned email address. This doesn’t necessarily mean that it is a secure communication, but will help with outsiders that are phishing for information.
  4. Take a closer look at emails that include attachments. It seems that we see attachments, we get curious and just click away. If there are attachments that you don’t really expect to be receiving then asking questions may save you from falling prey to a malicious attachment (and even PDF files can be malicious).
  5. Know the origin of USB drives and external storage before plugging them in. Some attacks can be as simple as sticking a piece of malicious code on a USB drive and plugging it in. If it doesn’t come from your circle of trust… then you’d better think twice before plugging it in. But, even if it is in your circle of trust, you may want to check with the sender before you just pop it out of the envelope and into your precious computer.
  6. A good IT department won’t ask you for your password. They will have you type it in on screens where it is required. … and never email your password, write it down on a sticky or paper scrap, communicate it over the phone, SMS text it, or anything else. It is between your brain and your fingers as they type it on a keyboard!
  7. It is up to you to keep your data safe. Don’t rely on someone else to do it for you. Have a proactive mindset and use common sense.

Stay safe!

[author: Dana Morrison]