(6 Jun 2013) InfoWatch - Digital Citizenship [DC 15]

As smartphones continue to lead the market, there will always be malicious apps lingering around dangerously as bait to trap. It is up to us to take that step be it, installing a mobile security pack or being meticulous about what to download to our phones.

How to avoid downloading malicious apps to our smartphone?
Below, we have listed some handy tips for to follow in order to ensure our phone is as smart as it should be.
  1. Before downloading any app, be it a game or a tool app, it is important that we research on the developer of the official app. For example, the fake Temple Run which appeared on the Marketplace did not indicate the same developer, Imangi Studios, as it did on the Apple Store.
  2. Pay attention to the list of security permissions that the app requires before downloading. Ensure that the app you are downloading do not ask for unnecessary permission to your smartphone. If something looks suspicious, do NOT take the risk. Just skip it.
  3. Install a Mobile Security app pack for the device. Some may say that it’s unnecessary but you will never know when these attacks can hit you.
  4. Read comments from users regarding the app before you download. It is great to get feedback from other users. They may be able to warn you of the dangers the app can bring you, along with the performance of it.
  5. Check how frequent the app has been downloaded. This may not be the most accurate way, but  if an app gets 3,000,000 downloads and a whole lot of positive reviews, you know you are on the right track. Stick to it!

(22 May 2013) InfoWatch - Digital Citizenship [DC 14]

In this post we will see the dangers of Malicious apps.

Malicious, stubborn apps  have been appearing and many are able to collect sensitive and private data from our phone. Once a malicious app is installed on our phone, the hacker gets control of almost EVERYTHING. 

Some apps are even able to track your movements and whereabouts, making it an even more pertinent threat to your physical safety. In short, these cyber criminal can access our physical location, pictures, contacts, location, addresses and credit card information without our knowledge. How dangerously creepy is that?!

I don’t know how these apps got into my phone!

Most of us only realise when it’s too late.  Cyber criminals are pretty smart. They will not directly present to you a suspicious looking app and expect you to install it. So what’s the one thing they turn to? They disguise themselves in game applications!

Just recently, according to the article from Geek. Google has removed at least 10 apps from their Android Market which contain malicious code! Some of the apps are under the guise of Angry Birds add-ons and malware was found residing in these apps!

Another case revolved around the popular iPhone game, Temple Run. Many were unaware that the official Temple Run game was only released for Apple phones and that it was not on Android Market yet. However, it was recently announced that the official Temple Run will be released on the Marketplace on 27 March 2012. Before the press release was announced, bogus versions of Temple Run have already started making its presence on the Android Marketplace, thus allowing users to unknowingly download them along with the malware that comes with it!

(9 May 2013) InfoWatch - Digital Citizenship [DC 13]

Android Mobile Security: What you need to know about malicious apps?

Recently, Android phones have been the target of cyber criminals, owing to its increased popularity and open nature of the OS. As such, our focus this month will be on android mobile security.

Smartphones - they are everywhere today. Most of us have the misperception that their smartphones are relatively safe and not prone to “cyber attacks”. However, it is important to take note that as the smartphone industry begins to grow, the appearance of malicious apps will follow suit. 

What we do not realise is that unlike computers, there is actually more sensitive information on their smartphones. From phone numbers and addresses to credit card numbers, pin numbers and passwords. Some even have private and confidential documents and photos stored on their phones. These makes them a “juicy” target for cyber criminals. 

We will continue with the dangers of Malicious apps in our next post.

(17 Apr 2013) InfoWatch - Digital Citizenship [DC 12]

In this post, we will know more about composing passwords with mnemonics.

Advanced password composition (mnemonics)

 Although you can find good password storage tools, some passwords are used so often it's best to memorise them (and besides, there may be times when these password management tools aren't available). Of course, in these cases, you'll want to make your passwords easy to remember but difficult to decrypt, and that's where a memory device can come in handy. 

For example, you may want to derive your password from an acronym that's meaningful only to you. Choose a line from a favorite song or saying and use the first letter of each word as the basis for your password. If you use this technique, make sure you mix in a few numbers or symbols for good measure. Or, take two short words with nothing in common (but that have special significance to you) and combine them with punctuation or numerals, and always remembering to use both uppercase and lowercase letters. 

Avoid using obvious or common words with vowels replaced by symbols or numbers (e.g. “p@ssw0rd”, “s1m0n”). And don't use the reverse spelling of a word. Hackers have figured that one out, too. The key is to use personally significant words or phrases in unusual ways. Get creative with password composition. You may just find yourself enjoying it.

(3 Apr 2013) InfoWatch - Digital Citizenship [DC 11]

In this post we will learn about Password Security and Management.
Passwords are the virtual keys to some of our most valuable information assets.
The problem is that passwords have become so common, so much a part of our daily lives, that we treat them with casual indifference. As a result, we too often fore-go security for convenience. We come up with weak passwords that are easy to guess. We write them down and tape them to our computer screens so that we won’t forget them.

But, with a little ingenuity and attention to detail, we can easily create and track rock-solid passwords. We can also take advantage of password management tools to keep these virtual keys safe, and ensure that our passwords operate as powerful complements to  security system, not as liabilities. 

Step 1: Build a better password
It's tempting to use birth date as password, or pet’s name. The problem is that these passwords are as obvious to hackers as they are to you. The challenge in creating a hacker-proof password is to make the password difficult to guess without making it impossible to remember.

To create and maintain strong passwords, start with these suggestions: 
  • Use a combination of uppercase and lowercase letters, symbols, and numbers.
  • Make sure passwords are at least 8 characters long. The more characters passwords contain, the more difficult they are to guess.
  • Try to make passwords as meaningless and random as possible.
  • Use different passwords for each account.
  • Change passwords regularly. Set up a routine (e.g. changing passwords on the first of each month).
  • Never write passwords down, and never give them out to anyone.

To avoid weak passwords, consider these suggestions: 
  • Don't use names or numbers associated with you (such as your child’s birth date or your spouse’s name).
  • Don't use your user name or login name in any form.
  • Don't use a derivative of names or numbers associated with you.
  • Avoid using a solitary word in any language.
  • Don't use the word “password” as your password.
  • Avoid using easily-obtained personal information. This includes your telephone numbers, identification card number, car’s license plate number, and street address.
  • Don't answer “yes” when prompted to save your password to a particular computer. Instead, rely on a strong password committed to memory or stored in a dependable password management program.

    Hope these tips can help you build and maintain strong passwords. We will learn about Advanced password composition in subsequent post.


      (20 Mar 2013) InfoWatch - Digital Citizenship [DC 10]

      In this post we will see security tips for your Social Media accounts:

      Facebook’s goal is social sharing and relevance and they do that by broadcasting almost everything you do to your friends. Tweak your profile settings to control what and who you share your content and activity with.

      • Click on Apps in the left menu under your Account Settings.
      • First, delete any applications that you are not using or do not intend to use anymore.
      • Next, tweak the permissions for each application by changing the setting for “Who can see posts and activity” from this app to “Friends”, unless you really want it to be “Public” or otherwise.
      • Next click on Facebook Adverts in the left menu. Edit the third party advert settings and social advert settings to “No one”.
      • Lastly, set your Facebook posts’ default privacy to something you are comfortable with. The default is “Public”. We recommend changing it to “Friends”.
      • Prevent others from searching your profile through email address by un-checking “Let others find me by my email address” checkbox in Twitter settings.
      • If you are harassed on Twitter, you can block the person and report them to Twitter. To block a person on Twitter, visit the person's profile and click "Block."
      • Avoid clicking on redirect links from users you don't trust. Usually redirect links are from spammers who will attempt to redirect you to a virus! Make sure you only click on links from users you know and trust.
      • Be extremely cautious when it comes to revealing any personal information publically, such as your email address, phone number, home address, and your work address.
      • Change your Twitter password often and don't use the same password on any other websites.
      • Always make sure you're visiting the real Twitter.com. Check the URL in your browser & make sure it begins with http://www.twitter.com.
      In our next post we will learn about password security and management.

      (6 Mar 2013) InfoWatch - Digital Citizenship [DC 9]

      In this post, we will know about Online identity and how to secure it.

      What is Online Identity? 
      An online identity is used to uniquely identify yourself to others online. Your personal data such as NRIC, Internet banking login, and email address could all be a form of your identity online.

      Why do we need to secure our Online Identity?
      If the personal data is disclosed online, malicious users could masquerade as you to conduct malicious acts. Your email address might be misused to send messages embedded with malware to your friends and associates or funds might be taken out from your bank account.

      • Limit personal information that you put online
        Do not post/share personal information (e.g. Date of birth, phone number, etc) on websites as malicious users can easily harvest the information and misuse those information.
      • Safeguard your password
        Do not share your password with others. As a good practise, use different passwords for different accounts. A strong password should be used and changed regularly to reduce its likelihood of being compromised.
      • Safe surfing
        Avoid entering sensitive information on unsecured sites. Install security suite (i.e. Anti-virus software and Firewall) on your surfing device.
      • Watch out for phishing emails
        Do not reply to emails that requests for your personal information (e.g. password, credit card details).
      We will discuss about Security Tips for Social Media accounts in the subsequent post.

      (20 Feb 2013) InfoWatch - Digital Citizenship [DC 8]

      In the previous post, we learned about wireless security at Home. Today we will see about wireless at Outdoor places.

      In outdoor places, protect your data privacy when using public Wi-Fi by practicing the following steps:
      1. Turn off folder sharing - Must turn off sharing for your folders as anyone on the same network can access them. They don’t even need to be a hacker.
      2. Awareness is good practice! - Beware of the information you share in public locations. Even seemingly innocuous logins to Web-mail accounts could give hackers access to your more important data, and especially since most people utilize the same password with a few variants for almost all online activities.
      3. Switch it off – If you are working offline for extended periods of time, shut down or disable your wireless connection. Every minute you're on someone else's wireless network is a minute you're exposing your machine and your data to intruders.
      4. Invest in a good antivirus and internet security product - Run a comprehensive security suite and keep it up to date to block out spyware and viruses.
      5. Disable P2P connections - Many Wi-Fi hackers set up "ad hoc" networks disguised to look like verifiable networks in airports and the like. They'll usually have names like "Free Wifi", "Free Airport Wireless," and so on. Turn off your P2P connections for wireless unless you're certain you are connecting to a verified, trusted network. 
      In our next post, we will discuss about Online Identity Security.

      (6 Feb 2013) InfoWatch - Digital Citizenship [DC 7]

      Wireless Security

      If someone is able to access your wireless connection, they may even be able to access the files on the computer. Hackers may exploit unsecured wireless network to compromise the computer or perform malicious activities in your name, such as sending spam emails or downloading illegal content.

      Things to remember in securing your wireless network at home with the following settings:
      • Enable WPA2 encryption with strong passphrase
        Try to use a complex and long passphrase as your encryption key to ensure that your entire wireless setup is secure.
      • Check and control the devices that are connected to your wireless network
        This can be done by checking the MAC address filtering settings.
      • Disable SSID broadcast The SSID is essentially the name assigned to your network. SSID is broadcasted by your wireless router for devices to connect to your wireless network. You have the option to disable the broadcast if you do not want your wireless network name to be listed in devices’ wireless network search.
      • Change the default wireless router administrator username and password
        As with any password, make it a rule of thumb to have at least 8 alphanumeric characters in upper and lowercase, numbers and symbols for your password.
      We will learn about securing wireless at outdoor places in the subsequent post.

      (23 Jan 2013) InfoWatch - Digital Citizenship [DC 6]

      In past few posts we have learned about securing our computers from cyber threats, today we will see how we can protect mobile devices from cyber threats.

      Mobile Security
      A mobile device is a hand held computing device that has an operating system (OS) , where “Apps” and software can be installed for use. Most hand held devices come equipped with Wi-Fi, Bluetooth and GPS capabilities, which allow connections to the Internet and other Bluetooth capable devices such as an automobile or a microphone headset. Examples of mobile devices are handphone, tablet PC and laptops.

      The Do’s…
      The Don’ts…
      • Disable WiFi and Bluetooth when not in use
      • Use password and encryption to protect your data
      • Backup data regularly
      • Be careful while connecting to unknown wireless network
      • Jail breaking/rooting might void your device’s warranty and expose the operating system to vulnerabilities that could be exploited by hackers.

      We will discuss about wireless security in our next post.

      (9 Jan 2013) InfoWatch - Digital Citizenship [DC 5]

      In this post we will discuss about Having a Correct security mind-set to protect the computer from Cyber threats.

      • Any website or email could be a malware source
        While visiting adult-rated sites and downloading pirated software puts us at a greater risk of infection, even legitimate web sites can be hacked and made to propagate malware. Email attachments from someone we know might also turn out to be a malware. Make sure the anti-virus program is able to warn about these threats.
      • Many types of malware are installed voluntarily
        The most common threats are Trojans, which spread via social engineering. The malware writer convinces us to run his innocent-sounding program, which secretly does something else than its stated purpose. For example, it might claim to be a new audio playback plugin but actually it turns out to be a program that hides in our computer and steals passwords or sends spam. So only download files and programs from trusted sources.
      • No computing environment is immune.
        Every platform can be exploited by a cyber-criminal. Some may say that if they use an OS X on a Mac, which is currently a lesser target as compared to their MS Windows counterparts, they do not need to install any security software. However, we have to take note that OS X is growing rapidly in popularity and this will then attract enough attention from the bad guys. As such, no matter which operating system we use, always update it with the latest patches to prevent the vulnerabilities from being exploited.
      • Keeping computer secured is our responsibility
        People are aware that keeping our computer secured is a very important role in today’s modern world. Everyone is connected these days one way or another. We should stop being complacent about this issue as cyber-crimes are actually growing rapidly worldwide. Therefore, it is just our responsibility to ensure that we’ve done our part in keeping our computer secured, thus, enhancing the safety of our online world.
      So make sure to invest in good computer security products. Remember, having just one computer security product to take care of one aspect in the computer is NOT enough, take time to find the best product to purchase that will make up a security suite suitable for the computer.

      (20130105) Parents Engagement Session for Sec 1 Students' Parents

      Dear Parents

      Below are the links to the slides/ materials shared during the session:

      Part 1: Digital Citizenship

      Part 2: Talk by School Counsellor 

      Some parents requested reference to the list of software that are installed in the learning device.
      Please click HERE to access the list (that was posted in the Students Blog on 3 December 2012)

      You may also CLICK HERE to the visit the G+ Events Page for information.

      (26 Dec 2012) InfoWatch - Digital Citizenship [DC 4]

      Let us discuss how Personal firewall and Software updates helps in securing the computer from cyber threats.

      What is the purpose of Personal firewall?

      Personal Firewall is necessary for protecting against incoming and outgoing connections to our computer. Incoming threats such as hacker attempts can result in loss of sensitive information. Outgoing connection protection ensures that even if a malware that resides in the computer attempts to connect to an external computer, it will be blocked. Threats like these can go on unnoticed in the background without us even realizing it! 

      So make sure that the computer is protected by a personal firewall, and correctly configure it to block suspicious access or alert us of such attempt and let us decide whether to allow the connection.

      How does Software updates help in protecting the computer?

      Software updates remove programming flaws and vulnerabilities in computer software that can be exploited by hackers and malware. Software that is recently purchased may also contain vulnerabilities as the software could have been developed some time ago. As such, software that we install on our computer should  be uploaded with the latest patch as soon as it is installed.

      Lastly, we will discuss about having a correct security mind-set in our next post.

      (12 Dec 2012) InfoWatch - Digital Citizenship [DC 3]

      What does an anti-virus software do to protect the computer from cyber threats?

      Anti-virus software is used to detect and remove malicious software ( malware), which is used by hackers to infiltrate computers and servers to provide a form of back-door access or programmed for malicious intent. This could include turning the computer into part of a bot network designed to ‘attack’ other websites or computer systems.

      These days, anti-virus software are also capable of detecting spyware, a type of malware installed on computers to collect information about users without their knowledge. Spywares can be programmed to steal your credit card information, passwords or other sensitive data and use them against your knowledge.

      So make use of the anti-virus software to detect and eradicate such threats. Use anti-virus software to scan internet downloads, external discs and drives, and schedule periodic scans of your whole computer. To be effective, the anti-virus software must be configured to update its signature databases automatically.

      (28 Nov 2012) InfoWatch - Digital Citizenship [DC 2]

      Let’s get started by first understanding what computer security is. This is one of the key essentials of strengthening our personal security.

      There used to be a time when the only computer threat you had to worry about was viruses. Today, the digital world has advanced so quickly that it is no longer the case.  Other than the propagation of viruses, threats now come from hackers, phishing sites and more trying to gain your confidential information or to use your computer for criminal activities. So how do we protect ourselves?

      Computer security covers all efforts that protect a computer from cyber threats. Some of the measures to be taken in securing a computer are
      • By installing Anti-virus software
      • Creating personal firewall
      • Software Updates
      • Developing correct security mindsets.
      We will discuss about Anti-virus software and its purpose in our next post.

      (24 Nov 2012) Y2013 Sec 1 Registration - Digital Citizenship Matters

      In SST, technology is ubiquitously used to support and enhance learning. Internet access allows students to learn, access and share resources. Online collaborative platforms serve as an avenue to interact and collaborate with people anytime and anywhere.

      A hardcopy of the [link] Acceptable Use Policy (AUP) was included in the Registration package. It is intended to prescribe effective, ethical and lawful use of ICT resources by students and ensure a conducive and safe virtual environment to our learning community. This policy applies to the use of the ICT resources owned and managed by SST, as well as those brought in for use by students in SST. All students are to comply with this Policy.

      Technology use in learning is not limited to curriculum time in the school. It is therefore important for parents to play an active role to help their children to manage their activities with the learning device so as to maintain a balance lifestyle.

      Parents are strongly encouraged to maintain the administrator right of the learning device and use the parental control feature (recommended: Setting bed time from 11pm to 6am) to help manage your child’s access to the learning device.

      Here are some useful pointers to Parents and Students:
      To Configure Parental Control in the Learning Device, you may watch the online guide from the Apple Website:

      Please complete the acknowledge form and return it to the school through your child, latest by 4 January 2013.

      (14 Nov 2012) InfoWatch - Digital Citizenship [DC 1]

      Dear Students

      As part of the school's concerted effort to promote digital citizenship in the SST community, we are rolling out the InfoWatch series to heighten our awareness on the various aspects of technology use and to better prepare ourselves as a responsible Digital Citizen in the 21st century.

      The series will focus on the 9 elements of Digital Citizenship (click at hyperlink for more information). Information and tips will be posted at the blog at a regular basis.

      To kick-start the programme, we begin by looking how we could strengthen our personal security :)

      Strengthening Personal Security

      To strengthen personal security, users must adopt secure practices in using computing and networking devices such as computers, mobile devices and wireless routers, and when they go online. 

      In the realm of cyber security, we need to adopt a strategy known as “defence-in-depth” to protect ourselves effectively. It is crucial to fortify the devices that we use to do our work by adopting appropriate security measures. Without these measures, our devices might be hijacked to join the hacker’s army of botnets in just minutes after you connect to the Internet! 
      S/N Areas What can we do
      1. Computer Security
      • Install / update anti-virus software
      • Install personal firewall
      • Software updates
      • Developing correct security mindsets
      2. Mobile Security
      • Enable mobile device password lock
      • Disable Bluetooth / Wi-fi when not in use
      3. Wireless Security
      • Remove unknown devices from wireless router
      • Disable SSID broadcast on wireless router
      4. Online Identity Security
      • Remove personal particulars posted online (e.g. mobile number, date of birth)
      • Restrict access for social media profile (e.g. apply Facebook security)

      Look out for further elaborations in subsequent posts.

      Information Security in the Internet - for yourself & home

      ASEAN-Japan 1st Cyber Security Awareness Week 

      The 2nd week of October 2012 has been designated the inaugural ASEAN-Japan Cyber Security Awareness Week, with the tagline “Be Aware, Secure, and Vigilant”.

      The ASEAN-Japan Cyber Security Awareness Week is the first collaboration event between ASEAN member states and Japan on security awareness raising initiatives. A collection of cyber security collaterals have been developed for the various countries’ usage to promote the Awareness week, one of which is the awareness video relevant for sharing with students who are likely to be avid online users.

      The awareness video is hosted at https://www.gosafeonline.sg/media/asean_eng.mp4 .
      What's in the video:
      • 0:54 Beware of Careless Website 
      • 1:58 Leakage of important information by targeted email attack 
      • 3:07 Unfamiliar email may make you a perpetrator in a Dos attack 
      • 5:34 If your password is stolen 
      • 7:48 Summary
      More information on ASEAN-Japan 1st Cyber Security Awareness Week can be found at https://www.gosafeonline.sg/inaugural-asean-japan-cyber-security-awareness-week

      For Your Reading Pleasure: Parents in Education - Cyberwellness

      A new Parents in Education (PiE) website was launched at the Ministry of Education Work Plan Seminar, 12 September 2012. This website aims to help parents help their children, and make learning something that the whole family can be involved in.

      In this website, we can find a segment on Cyber Wellness which would be a useful reference for parents and students.

      See more info at Digital Citizenship page

      For Your Reading Pleasure: What Parents Must Know about Facebook

      Parents/Guardians looking to better understand and manage your child’s online interactions via social networking media such as Facebook may wish to check out this online resource for tips on how to ‘parent Facebook users’ and better protect your child’s privacy:

      See more info at Digital Citizenship page

      For Your Reading Pleasure: 6 Ways to Kick Your Facebook Addiction

      While it's important to keep yourself updated with the latest upcomings via social media, do ensure that your interaction is kept to a healthy level. Check out this article on how to balance it out.

      See more info at Digital Citizenship page

      Y2012 S1: Collection of Learning Devices

      Dear Parents and Students

      The vendor will be contacting you via sms & email to confirm the collection date and time of the learning device.

      Please be present with your child during the collection as it involves the signing of documents by parents.

      There are 3 parts to the Programme

      (A) Collection of Learning Device (Starting 30 minutes before the stipulated time in the order form)
      (i) Sign documents for Collection
      (ii) Completion of Insurance Policy document
      *Please bring along your receipt for collection

      (B) Training Session (Starting at the time indicated in the order form. Approx 1 hour)
      (i) Checking of items to ensure the learning device is in order; signing of checklist
      (ii) Setting up of Accounts and passwords
      (iii) Configuring Parental Control
      (iv) Tips to take care of the learning device
      (v) Briefing on the AppleCare Protection Plan Policy (by Representative from Apple)
      (vi) Briefing on the Insurance Policy (by Insurance Agent)
      (vii) Setting up of AppleID and Purchase of iWork
      (viii) Question and Answer

      (C) Talk by School for Parents (By Cyberwellness Coordinator and School Counsellor) (Approx 1 hour)
      (i) Acceptable Use Policy
      (ii) Managing Your Child's use of learning device
      (iii) Dangers of the Social Media
      (iv) Preventing Internet Addiction

      We strongly encourage that one parent to be with the child throughout the programme.

      Y2012 Sec 1: Announcement: Time Machine

      Dear Parents

      Please be informed that the instruction notes to set up the Time Machine for the new computers (with Mac OS Lion) will be available by 7 January 2012.
      Thank you for your attention.

      IT HelpDesk

      (20111201) Annoucement: ICT HelpDesk Services

      Dear Students

      The ICT HelpDesk will not be accessible on 1 & 2 December (Thursday & Friday) as we are moving to the new campus at 1 Technology Drive. Service will resume from 5 December 2011 (Monday).

      Should you need technical support on 1 & 2 December, you can go down to any Apple Authorised Service (as listed below, complete list is available at http://www.apple.com/sg/buy/service.html)

      Office address:
      QCD Technology (S) Pte Ltd
      No. 6 Tagore Drive, #04-03/04, Tagore Building
      Singapore 787623
      Tel: +65 6555 0478
      Fax: +65 6451 4420
      (Mon - Fri) 9.00am - 5.30pm
      (Sat) 9.00am - 1.00pm
      Closed on Sun and Public Holidays

      Office address:
      Micro 2000 Technology Pte Ltd
      8 Ubi Road 2, #08-20, Zervex Building
      Singapore 408538
      Tel: +65 6295 3998
      Fax: +65 6487 3179
      (Mon - Fri) 9.00am - 6.00pm;
      Closed on Sat, Sun and Public Holidays
      Sales: eserv@micro2000.com.sg
      Support: helpdesk@micro2000.com.sg

      Office address:
      Micro 2000 Technology Pte Ltd
      501 Orchard Road #02-20/23, Wheelock Place Singapore 238880
      Tel: +65 6733 4636
      Fax: +65 6733 4620
      (Sun - Thurs) 11.00am - 9.00pm;
      (Fri - Sat) 11.00am - 10.00pm;
      Sales: eserv@micro2000.com.sg
      Support: helpdesk@micro2000.com.sg

      Sapura Service@FunanCentre
      Office address:
      Sapura Synergy (S) Pte Ltd
      (Nearest MRT – City Hall) 109 North Bridge Road
      #05-44 Funan DigitaLife Mall Singapore 179097
      Tel: +65 6337 2993
      (Mon - Sat) 11.00am - 7.30pm;
      (Sun and Public Holidays) 12.00 noon - 7.00pm
      Free Pickup Service (for Desktops/Notebooks Only, within Singapore)

      Apple Technical Support - Singapore Toll
      Tel: 800-186-1087
      (Mon - Fri) 9.00am - 9.00pm;
      (Sat) 9.00am - 3.00pm;
      Closed on Sun and Public Holidays

      We are sorry for any inconveniences.

      ICT Helpdesk.

      25 Nov 2011: 2012 Secondary 1 - Purchase of Learning Devices

      Information pertaining to the three packages available through NCS are available in the Handouts (found in the Registration Package).

      Please liaise directly with the sales personnel at NCS pertaining to the purchase and collection of the Macbook package:
      Ms Lek Liling
      Email: lekliling@ncs.com.sg
      Address: No 5, Ang Mo Kio St 62, NCS Hub, Singapore 569141

      About the Purchase
      For parents who intend to pay by cheque, you may place your order in the school on
      • 25 November 2011 (Friday) 9 am to 4 pm
      • 29 November 2011 (Tuesday) 9 am to 12 noon

      You may also choose to pay by credit card from the online website found in the order form. Online payment is subjected to 2.5% admin charges.

      For purchase after 29 November, you will collect the learning device when school reopens.

      Collection of Learning Device

      For orders placed on/before 29 November, the learning device will be ready for collection on 28 December 2011 (Wednesday) at the new campus (1 Technology Drive).

      Alternatively, you can choose to collect the learning device on 7 January 2012 (Saturday)

      Use of Learning Device in Term 1 Week 1 (Orientation Week)
      Students will bring their learning device to the school from the 1st day of school. ICT-enabled learning activities will be incorporated into the orientation programme (except the camp).

      Students will be using applications like PhotoBooth and Quicktime Player to take pictures and create short video clips. Most of the learning activities will require students to blog.

      For students who do not have the learning device will share with their classmates to carry out the activities in class. Alternatively, they could complete some of these activities after class.

      25 Nov 2011: 2012 Secondary 1 - Purchase of iWork

      iWork (comprises of 3 applications: Pages, Numbers, KeyNote)
      The suite of applications will be used in lessons for various learning activities.

      In Term 1, all students will learn how to use a suite of applications necessary for their learning programme, which includes iWork and iLife.

      Note that iWork is not included in the package offered by NCS.

      The Purchase

      You may purchase iWork via the Apple Online Store (Singapore) or iTunes.
      Suggested links:
      Please note that there is a difference in the Price and the Packaging.

      You may also check it out with Apple authorised reseller: http://www.apple.com/sg/reseller/apr/list.php

      21 December 2010 & 3 January 2011: Collection of Macbooks


      During the session, we share with the following:
      • Care of Computers
      • AppleCare Protection Plan (APP)
      • Insurance Policy
      • Checking and Setting up of Learning Device
      • AUP (very briefly, with reference to Handouts) & Signing of AUP
      You will find the materials presented during the session in the various sections in this blog

      If you need further assistance, you may contact the following:
      • Ms Shirley Lim (NCS): Learning device and package purchased, including collection matters (Email: xueli@ncs.com.sg)
      • Mr Shahli (Apple Service Centre): AppleCare Protection Plan and Technicalities like setting up of accounts, configuration for back-up (Contact: 6571 7200, ext 228)
      • Mr Lucas Teng: Insurance-related matters (Contact: 9147 7992; Email: lucas.teng@rizksolutions.com)
      For matters pertaining to SST ICT-related Programmes, you may email your enquiry to contactus@sst.edu.sg and direct to the following
      • Mr Johari (SST, Teacher): On Cyberwellness Programme
      • Ms Loh Kwai Yin (SST, HOD/ICT): On ICT Programme in the school

      15 May 2010: 2nd ICT Engagement Session for Parents

      Dear Parents

      Thank you for your active participation and encouraging feedback.

      Below is the set of materials presented in the session
      We will be sending the set of the materials to the Parents who attended the session by the middle of this week.
      A similar session (covering the Care of the Learning Devices & Backup Procedures) has also been scheduled for students during the Assembly on 20 May 2010.

      Please click at the slides to activate full display

      Slides on AppleCare Protection Plan (by Apple Inc)

      Slides on Care of Computers (by QCD)

      Slides on BackUp Procedures (by QCD)

      Workshop Blog for Part 2: Learning Activities

      Gentle Reminder... on the Learning Device

      During this one-week school vacation, let's continue to exercise our responsibility to taking good care of our learning devices and our learning 'assets' developed in the past 10 weeks.

      • It is time to backup copies of work!
      • There are many ways to backup our work - the simplest way is to make duplicates into portable storage medium (e.g. portable hard disk or thumb drive). We can also use other means (e.g. the Time Machine). However, no matter which method we use, remember to read the instructions carefully to ensure our data are safe.
      • Data recovery is no easy process... and it is costly - even if we pay $ for the recovery work, often, once the data is lost, it's lost forever...
      • Always think twice before installation of any 3rd party applications - what impact does it have on the other applications in the learning device. Some 3rd party can create disastrous and irreversible impact on your machine and the work you saved in the system.
      Before school re-opens, remember to housekeep your learning device:
      • Remove any irrelevant program(s) that you installed or experimented during the school vacation.

      During the school vacation, the Apple Service Centre is open as usual. If you need help/support, you may call up the HelpDesk before coming to the school (See Contact Information on the right panel).

      Have a good one-week vacation...

      Other information:

      27 February 2010: ICT Engagement for Parents (I)

      Dear Parents

      Thank you for your active participation. We also appreciate your valuable feedback to the sessions.

      Below is the set of materials presented in the session
      We have also sent a set of the materials to the Parents who attended the session.
      A similar session (covering the Care of the Learning Devices & Insurance Coverage) has also been organised for students during the Assembly on 4 March 2010.

      Please click at the slides to activate full display

      (A) Care of Learning Devices

      (B) Mac OS - Access Control

      (C) Insurance

      The slides are published with permission from our Technology Partners.

      We would also like to thank our Technology Partners for the support and putting up this sharing session for our Parents.