SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
GITA
Leadership
• • •
Wendy Woodward
President
Patrick Butler
Vice President
Janet Huggins
Secretary
Dr. Desiree DePriest
Faculty Advisor
Dr. Michael
McGivern
Faculty Advisor
Newsletter Date
Volume 2 Issue 6
GITAGraduate Information
Technology Association
I N S I D E T H I S I S S U E
1 Welcome
1 What Did I Miss?
2 Current Projects
3 Tech Talk
4-5 Cyber Security What is
it? How to Protect It
6 Check This Out!
6-7 Announcements
8 GITA Code of Ethics
8 GITA Mission
8 Contact
Welcome GITANOS!
Our guest speaker for February’s GITA Members meeting
will be Dr. Stephen Beyer who will present "Success After
Graduation"
GITA Members meeting will be held February 26, 2015 at 8:30
pm ET.
What Did I Miss?
By Tiana Lawson
For those of you who missed our meeting in January, you missed a good
topic of the challenges of a busy life presented by Dr. Thomas Boyd,
VP/Dean School of Business & Information Technology. It was enlightening
because he explained the importance of maintaining a balance in our lives.
When we get busy in our lives we tend to overlook important details and
start to settle or focus on taking the next thing off our list. Dr. Boyd
explained his approach to a balanced life which include the physical,
spiritual, artistic, and intellect. To view the presentation, please visit the
GITA homeroom to access the recording. You will be glad that you did!
Page 2 Volume 2 Issue 6
Current Project Updates
By Erica Sims
IT Security Project Updates
The IT Security team has posted February's topic:
Need some ideas of how to better secure your home? Maybe you need a quick
checklist to give to a friend. Check out the Security & Assurance groups article for
February: Physical Security: Residential.
This team is diligently working on its March’s topic. April’s topic has been chosen and a
reference document with the subject matter has been discussed.
Database Project Updates
The Database team has access to the database server. The Database group is finding
out what is contained within the database and assessing what needs to be done to
bring it current. Future plans are to link this newsletter to the database allowing for more
robust access to information!
Facebook Project Updates
The Facebook team has been upgraded from a Facebook page to a Facebook Group.
Topics are added often that relate to current events in technology to events that are
hosted by GITA.
Homeroom Project Updates
The Homeroom is updated periodically with information pertaining to the projects. A
new appearance for the Homeroom is being researched and any suggestions are
welcome.
Newsletter Project Updates
The Newsletter team is working diligently to improve their website.
KapTechnology Intern Mentors
Those GITAnos who have graciously volunteered to mentor AA and BS interns continue
to answer questions and provide support in our homeroom under KapTechnology
Workbench tab!
Volume 2 Issue 6Page 3
Does your audio need a boost?
Is the sound on your laptop mediocre at best? There may be a fix that will boost the quality of
the sound that comes out of your laptop while you are working away from your go to
speakers. The help comes in the size of a thumb drive. This new gadget is by Apogee and it’s
called the Groove and it will work with both PCs and Macs. There’s a little more info at
http://www.msn.com/en-us/news/technology/apogees-usb-dac-is-an-audio-boost-in-a-tiny-
package/ar-AA8uQuc.
Tired of switching cell phones every 1 to 2 years?
A Finnish startup company called Circular Devices has come up with the idea to make cell
phones modular. They call it the PuzzlePhone and is created so that certain parts are
modular and easy to replace if need be. Circular Devices has broken the phone down into
three parts: the brain which contains the computing components, the heart which is – you
guessed it – the battery and the spine which is the display. So if you have one of these
phones and you crack the screen (like many have done), no need to go to a certified Apple
specialist to replace the screen…just order a new one. Could be the wave of the future, check
it out at http://www.msn.com/en-us/news/technology/apogees-usb-dac-is-an-audio-boost-in-a-
tiny-package/ar-AA8uQuc.
Macs are not as impenetrable as people think…
Microsoft seems to get the brunt of the abuse when it comes to people finding security flaws
and publishing them before Microsoft fixes them. Google has a security unit called Project
Zero that found at least two vulnerabilities in OS X that have gone unpatched. Google’s team
notified Apple about the vulnerabilities, waited their standard 90 days and then published
what the holes were. Seems Apple is not as perfect as everyone thinks. See the full write up
at http://www.msn.com/en-us/news/technology/google-reveals-mac-security-holes-before-
apples-fix-is-ready/ar-AA8wp2k.
This issues big question for its readers:
Is all of the software on your systems up to date? Including antivirus? It’s a new year and
subscriptions run out. Time to check those subscription services (like antivirus) to make sure
your subscription hasn’t lapsed.
Tech Talk
By Donna Landers
Page 4 Volume 2 Issue 6
Cyber Security What is it? How to Protect It
By Kevin Moore, MSIT, CCENT, Security+, Sr. State IT Security Operations
Engineer
Cyber Security, often referred to as information security or “InfoSec” for short, is the attempt to
protect computers, networks, applications, programs, and data from intended or otherwise
unintended or unauthorized access, change, or destruction. The misconception that has been
relayed quite often is the protection only applies to computers, but nothing can be further from the
truth. The actual area of focus is the data or the information that resides on any digital device
such as cell phones, PDA’s (yes some still utilize them), tablets and any other form of digital
device that stores data. The data needs to be protected at rest, in transit, or while in use.
There are many opportunities in this field and the areas of study are limitless. Many in the field
enjoy cyber security for the sheer excitement of deciphering and strategizing the next move of the
cyber security mavericks. We, as security professionals, must become well versed in several
areas of security and network functions as well as forensics. There is no shortage of subjects to
tackle when it comes to out-maneuvering your opponents. Anything is possible and the
vulnerabilities are without measure. That is what drives learning and conceptualizing new
techniques which require the ingenuity of a hacker, the methodology used by scientists, the
instincts of a detective to recreate an event, as well as being a technological genius traversing
through tools and techniques you find the most effective in your line work. Sounds pretty
intimidating but if you have an interest in what you do then that will be overcome by the days
spent learning and creating techniques that are unique to the areas you choose to focus on. It
could take a life time of study to actually obtain the mastery at which you feel you’re competent to
hold the position because threats are always changing. At the same time, that’s how you know
you are in the right profession because you will see the career of lifelong learning as an asset not
a job.
To protect the data it would only make since to restrict the data or encrypt the data so that if
it resides on a device that was lost or stolen the data would be of no use to the individual
trying to access it. If this simple technique was applied in some of the major breaches that
have occurred over the recent years, companies would feel a little more secure and have
confidence that we are closing the gap on some of these threats. If you have certain tools and
technologies at your disposal but you do not realize the potential of the tool, then you are
doing you and your organization a disservice by not doing your due diligence to find out what
the tools can do. Once tested use your own creativity to apply those tools in a security
environment..
Volume 2 Issue 6Page 5
Cyber Security What is it? How to Protect It “(cont.)”
A few other caveats to utilize can come from just a few simple rules applied every day
until they become second nature to you. These suggestions will go a long way in keeping
your data secure.
1. When not utilizing your own personal Wi-Fi be wary of connecting to other wireless
networks. This is a breeding ground for sniffing attacks that can render your passwords
and therefore your data vulnerable to disclosure.
2. E-mails that tout some sort of financial gain and are too good to be true
advertisements RUN. These are the type of e-mails that dupe some of the savviest
individuals leading to a lot of personal information being released and unnecessary
embarrassment.
3. When accessing social media please do not mention your location, schedule, dates,
work related information, as well as other seemingly harmless data or Meta data.
There are cyber criminals scouring these sites and taking every bit of information and
logging it. One piece of information alone may not be a threat but if they’ve been
surveilling you over time the tiny bits of information that has been collected in
conjunction can prove to be the data needed to hack your accounts and even your
organization’s network.
4. Last but not least on your home networks when setting up your Wi-Fi steer away from
using the WEP setting for wireless encryption on your home router. It is currently very
widely used and offer very little if any security against someone hacking the usage of
your network and all your usernames, passwords, and financial data as well as any
other items you want to keep private. They can launch attacks from you network and
you would be seen as the cybercriminal until proven otherwise. Try using your WPA or
WPA2 settings on your Wi-Fi this setting is very secure and offers the most robust
defense against intrusion.
So that ends my first article for this new year of 2015 and hope to be bringing you much
more insight on the career, accomplishments and the struggles of being a security
professional.
Page 6 Volume 2 Issue 6
Man Buys MacBook on eBay for $450, Gets Just a Picture of It by Chris Matyszczyk, CNet-
February 5, 2015
This article is about a man who purchased a computer through eBay and received a paper with
the picture of the computer through the mail. So he basically paid for a piece of paper and he
did not get his computer that he purchased through eBay. EBay stated that he will get his
money back because he was expecting to receive a computer with his money.
Link to article: Man Buys MacBook on eBay for $450, Gets Just a Picture of It
Check This Out!
By Erica Sims
Next Upcoming Meeting
If you know of anyone you would like to speak at a GITA membership meeting
please contact our secretary or place your suggestions in the GITA homeroom.
In Other News…..
GITA has leased homeroom space to the IT undergraduate interns working for
KapTechnology, a department within KapConsulting, LLC. We need graduate students
to mentor these interns in the areas of database, networking, security assurance and
web design. Those GITAnos who are active in the mentoring committee can place this
work on their resumes as advisors for KapTechnology/KapConsulting LLC. It is a great
opportunity. Contact your GITA leadership to sign up!
Coming Soon
Community outreach project:
We would reach out to small businesses in our communities looking for IT
help. We are looking for GITA members to join this team.
Monthly Forums
Monthly forums where GITANOS would get together to network, discuss
various topics and get to know one another.
Announcements
Volume 2 Issue 6Page 7
Help Wanted
We still are in need of:
• Programmers
• Web Page Developers
• Business Analysts
• Security Specialists
• System Analysts
**Team Meetings**
Members of a project are required to attend and participate in those
meetings as per GITA membership requirements.
Announcements “(cont.)”
We’ve Got Cake
Page 8 Volume 2 Issue 6
Contact Information
President
Wendy Woodward
wendybraylee@aol.com
Vice-President
Patrick Butler
patrickbutler11@student.kaplan.edu
Secretary
Janet Huggins
Jnhuggins48@gmail.com
Database Project Manager
Donna Landers
szeliga4@yahoo.com
Facebook Project Manager
Robert Ariano
roba.afi@gmail.com
Homeroom Project Manager
Wendy Woodward
wendybraylee@aol.com
IT Security Project Managers
Pete Hernandez
petehernandez.ph.ph@gmail.com
Donna Landers
szeliga4@yahoo.com
Patrick Butler
patrickbutler11@student.kaplan.edu
Newsletter Project Manager
Tiana Lawson
Tiana.Lawson@gmail.com
GITA Code of Ethics and Social Responsibility
As a member of GITA, I promise:
1. To regularly attend GITA meetings
2. To participate to the best of my ability
3. To participate in team meetings and projects
4. To provide fellow members with helpful, constructive support and feedback
5. To help GITA members maintain a positive, friendly environment so all
members can learn and grow
6. To serve (GITA) as an officer when called upon to do so
7. To treat fellow GITA members and its guests with courtesy and respect
8. To bring guests to member meetings so they can see the benefits that
GITA membership has to offer (opportunity to recruit)
9. To maintain honest, highly ethical standards in all GITA meetings and
activities
GITA’s Mission to Empower All GITANOS
• To gain real world experiences building solution-based projects which
contribute to the industry.
• To foster positive collaborative teamwork, and
• To provide a vehicle for members to sharpen their communication skills.
Newsletter Team
Tiana Lawson
Erica Sims
Donna Landers
Kevin Moore
Jennifer Wilburn
Find us on Facebook
https://www.facebook.com/kaplanGITA

Weitere ähnliche Inhalte

Andere mochten auch

Solución actividad
Solución actividadSolución actividad
Solución actividadnvbghbjj
 
David Albon – Successful Entrepreneur
David Albon – Successful EntrepreneurDavid Albon – Successful Entrepreneur
David Albon – Successful EntrepreneurDavid Albon
 
More than a handshake: Calgary's lawyer for the horse world.
More than a handshake: Calgary's lawyer for the horse world.More than a handshake: Calgary's lawyer for the horse world.
More than a handshake: Calgary's lawyer for the horse world.liverpoollawfirms
 
Brochure_Gezinshuizen_24-07_2014
Brochure_Gezinshuizen_24-07_2014Brochure_Gezinshuizen_24-07_2014
Brochure_Gezinshuizen_24-07_2014Hans Baptist
 
Body Forward Coaching Call 1
Body Forward Coaching Call 1Body Forward Coaching Call 1
Body Forward Coaching Call 1Erica Willick
 
Land Wanted brochure Feb 2015
Land Wanted brochure Feb 2015Land Wanted brochure Feb 2015
Land Wanted brochure Feb 2015Gareth Davis
 
SP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATIONSP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATIONAhmed Hamdi
 

Andere mochten auch (9)

Solución actividad
Solución actividadSolución actividad
Solución actividad
 
David Albon – Successful Entrepreneur
David Albon – Successful EntrepreneurDavid Albon – Successful Entrepreneur
David Albon – Successful Entrepreneur
 
More than a handshake: Calgary's lawyer for the horse world.
More than a handshake: Calgary's lawyer for the horse world.More than a handshake: Calgary's lawyer for the horse world.
More than a handshake: Calgary's lawyer for the horse world.
 
Brochure_Gezinshuizen_24-07_2014
Brochure_Gezinshuizen_24-07_2014Brochure_Gezinshuizen_24-07_2014
Brochure_Gezinshuizen_24-07_2014
 
Body Forward Coaching Call 1
Body Forward Coaching Call 1Body Forward Coaching Call 1
Body Forward Coaching Call 1
 
Land Wanted brochure Feb 2015
Land Wanted brochure Feb 2015Land Wanted brochure Feb 2015
Land Wanted brochure Feb 2015
 
treball gimp`
treball gimp`treball gimp`
treball gimp`
 
SP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATIONSP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATION
 
H v mendenhall cv, 4 6-15
H v mendenhall cv,  4 6-15H v mendenhall cv,  4 6-15
H v mendenhall cv, 4 6-15
 

GITA February 2015 Newsletter

  • 1. GITA Leadership • • • Wendy Woodward President Patrick Butler Vice President Janet Huggins Secretary Dr. Desiree DePriest Faculty Advisor Dr. Michael McGivern Faculty Advisor Newsletter Date Volume 2 Issue 6 GITAGraduate Information Technology Association I N S I D E T H I S I S S U E 1 Welcome 1 What Did I Miss? 2 Current Projects 3 Tech Talk 4-5 Cyber Security What is it? How to Protect It 6 Check This Out! 6-7 Announcements 8 GITA Code of Ethics 8 GITA Mission 8 Contact Welcome GITANOS! Our guest speaker for February’s GITA Members meeting will be Dr. Stephen Beyer who will present "Success After Graduation" GITA Members meeting will be held February 26, 2015 at 8:30 pm ET. What Did I Miss? By Tiana Lawson For those of you who missed our meeting in January, you missed a good topic of the challenges of a busy life presented by Dr. Thomas Boyd, VP/Dean School of Business & Information Technology. It was enlightening because he explained the importance of maintaining a balance in our lives. When we get busy in our lives we tend to overlook important details and start to settle or focus on taking the next thing off our list. Dr. Boyd explained his approach to a balanced life which include the physical, spiritual, artistic, and intellect. To view the presentation, please visit the GITA homeroom to access the recording. You will be glad that you did!
  • 2. Page 2 Volume 2 Issue 6 Current Project Updates By Erica Sims IT Security Project Updates The IT Security team has posted February's topic: Need some ideas of how to better secure your home? Maybe you need a quick checklist to give to a friend. Check out the Security & Assurance groups article for February: Physical Security: Residential. This team is diligently working on its March’s topic. April’s topic has been chosen and a reference document with the subject matter has been discussed. Database Project Updates The Database team has access to the database server. The Database group is finding out what is contained within the database and assessing what needs to be done to bring it current. Future plans are to link this newsletter to the database allowing for more robust access to information! Facebook Project Updates The Facebook team has been upgraded from a Facebook page to a Facebook Group. Topics are added often that relate to current events in technology to events that are hosted by GITA. Homeroom Project Updates The Homeroom is updated periodically with information pertaining to the projects. A new appearance for the Homeroom is being researched and any suggestions are welcome. Newsletter Project Updates The Newsletter team is working diligently to improve their website. KapTechnology Intern Mentors Those GITAnos who have graciously volunteered to mentor AA and BS interns continue to answer questions and provide support in our homeroom under KapTechnology Workbench tab!
  • 3. Volume 2 Issue 6Page 3 Does your audio need a boost? Is the sound on your laptop mediocre at best? There may be a fix that will boost the quality of the sound that comes out of your laptop while you are working away from your go to speakers. The help comes in the size of a thumb drive. This new gadget is by Apogee and it’s called the Groove and it will work with both PCs and Macs. There’s a little more info at http://www.msn.com/en-us/news/technology/apogees-usb-dac-is-an-audio-boost-in-a-tiny- package/ar-AA8uQuc. Tired of switching cell phones every 1 to 2 years? A Finnish startup company called Circular Devices has come up with the idea to make cell phones modular. They call it the PuzzlePhone and is created so that certain parts are modular and easy to replace if need be. Circular Devices has broken the phone down into three parts: the brain which contains the computing components, the heart which is – you guessed it – the battery and the spine which is the display. So if you have one of these phones and you crack the screen (like many have done), no need to go to a certified Apple specialist to replace the screen…just order a new one. Could be the wave of the future, check it out at http://www.msn.com/en-us/news/technology/apogees-usb-dac-is-an-audio-boost-in-a- tiny-package/ar-AA8uQuc. Macs are not as impenetrable as people think… Microsoft seems to get the brunt of the abuse when it comes to people finding security flaws and publishing them before Microsoft fixes them. Google has a security unit called Project Zero that found at least two vulnerabilities in OS X that have gone unpatched. Google’s team notified Apple about the vulnerabilities, waited their standard 90 days and then published what the holes were. Seems Apple is not as perfect as everyone thinks. See the full write up at http://www.msn.com/en-us/news/technology/google-reveals-mac-security-holes-before- apples-fix-is-ready/ar-AA8wp2k. This issues big question for its readers: Is all of the software on your systems up to date? Including antivirus? It’s a new year and subscriptions run out. Time to check those subscription services (like antivirus) to make sure your subscription hasn’t lapsed. Tech Talk By Donna Landers
  • 4. Page 4 Volume 2 Issue 6 Cyber Security What is it? How to Protect It By Kevin Moore, MSIT, CCENT, Security+, Sr. State IT Security Operations Engineer Cyber Security, often referred to as information security or “InfoSec” for short, is the attempt to protect computers, networks, applications, programs, and data from intended or otherwise unintended or unauthorized access, change, or destruction. The misconception that has been relayed quite often is the protection only applies to computers, but nothing can be further from the truth. The actual area of focus is the data or the information that resides on any digital device such as cell phones, PDA’s (yes some still utilize them), tablets and any other form of digital device that stores data. The data needs to be protected at rest, in transit, or while in use. There are many opportunities in this field and the areas of study are limitless. Many in the field enjoy cyber security for the sheer excitement of deciphering and strategizing the next move of the cyber security mavericks. We, as security professionals, must become well versed in several areas of security and network functions as well as forensics. There is no shortage of subjects to tackle when it comes to out-maneuvering your opponents. Anything is possible and the vulnerabilities are without measure. That is what drives learning and conceptualizing new techniques which require the ingenuity of a hacker, the methodology used by scientists, the instincts of a detective to recreate an event, as well as being a technological genius traversing through tools and techniques you find the most effective in your line work. Sounds pretty intimidating but if you have an interest in what you do then that will be overcome by the days spent learning and creating techniques that are unique to the areas you choose to focus on. It could take a life time of study to actually obtain the mastery at which you feel you’re competent to hold the position because threats are always changing. At the same time, that’s how you know you are in the right profession because you will see the career of lifelong learning as an asset not a job. To protect the data it would only make since to restrict the data or encrypt the data so that if it resides on a device that was lost or stolen the data would be of no use to the individual trying to access it. If this simple technique was applied in some of the major breaches that have occurred over the recent years, companies would feel a little more secure and have confidence that we are closing the gap on some of these threats. If you have certain tools and technologies at your disposal but you do not realize the potential of the tool, then you are doing you and your organization a disservice by not doing your due diligence to find out what the tools can do. Once tested use your own creativity to apply those tools in a security environment..
  • 5. Volume 2 Issue 6Page 5 Cyber Security What is it? How to Protect It “(cont.)” A few other caveats to utilize can come from just a few simple rules applied every day until they become second nature to you. These suggestions will go a long way in keeping your data secure. 1. When not utilizing your own personal Wi-Fi be wary of connecting to other wireless networks. This is a breeding ground for sniffing attacks that can render your passwords and therefore your data vulnerable to disclosure. 2. E-mails that tout some sort of financial gain and are too good to be true advertisements RUN. These are the type of e-mails that dupe some of the savviest individuals leading to a lot of personal information being released and unnecessary embarrassment. 3. When accessing social media please do not mention your location, schedule, dates, work related information, as well as other seemingly harmless data or Meta data. There are cyber criminals scouring these sites and taking every bit of information and logging it. One piece of information alone may not be a threat but if they’ve been surveilling you over time the tiny bits of information that has been collected in conjunction can prove to be the data needed to hack your accounts and even your organization’s network. 4. Last but not least on your home networks when setting up your Wi-Fi steer away from using the WEP setting for wireless encryption on your home router. It is currently very widely used and offer very little if any security against someone hacking the usage of your network and all your usernames, passwords, and financial data as well as any other items you want to keep private. They can launch attacks from you network and you would be seen as the cybercriminal until proven otherwise. Try using your WPA or WPA2 settings on your Wi-Fi this setting is very secure and offers the most robust defense against intrusion. So that ends my first article for this new year of 2015 and hope to be bringing you much more insight on the career, accomplishments and the struggles of being a security professional.
  • 6. Page 6 Volume 2 Issue 6 Man Buys MacBook on eBay for $450, Gets Just a Picture of It by Chris Matyszczyk, CNet- February 5, 2015 This article is about a man who purchased a computer through eBay and received a paper with the picture of the computer through the mail. So he basically paid for a piece of paper and he did not get his computer that he purchased through eBay. EBay stated that he will get his money back because he was expecting to receive a computer with his money. Link to article: Man Buys MacBook on eBay for $450, Gets Just a Picture of It Check This Out! By Erica Sims Next Upcoming Meeting If you know of anyone you would like to speak at a GITA membership meeting please contact our secretary or place your suggestions in the GITA homeroom. In Other News….. GITA has leased homeroom space to the IT undergraduate interns working for KapTechnology, a department within KapConsulting, LLC. We need graduate students to mentor these interns in the areas of database, networking, security assurance and web design. Those GITAnos who are active in the mentoring committee can place this work on their resumes as advisors for KapTechnology/KapConsulting LLC. It is a great opportunity. Contact your GITA leadership to sign up! Coming Soon Community outreach project: We would reach out to small businesses in our communities looking for IT help. We are looking for GITA members to join this team. Monthly Forums Monthly forums where GITANOS would get together to network, discuss various topics and get to know one another. Announcements
  • 7. Volume 2 Issue 6Page 7 Help Wanted We still are in need of: • Programmers • Web Page Developers • Business Analysts • Security Specialists • System Analysts **Team Meetings** Members of a project are required to attend and participate in those meetings as per GITA membership requirements. Announcements “(cont.)” We’ve Got Cake
  • 8. Page 8 Volume 2 Issue 6 Contact Information President Wendy Woodward wendybraylee@aol.com Vice-President Patrick Butler patrickbutler11@student.kaplan.edu Secretary Janet Huggins Jnhuggins48@gmail.com Database Project Manager Donna Landers szeliga4@yahoo.com Facebook Project Manager Robert Ariano roba.afi@gmail.com Homeroom Project Manager Wendy Woodward wendybraylee@aol.com IT Security Project Managers Pete Hernandez petehernandez.ph.ph@gmail.com Donna Landers szeliga4@yahoo.com Patrick Butler patrickbutler11@student.kaplan.edu Newsletter Project Manager Tiana Lawson Tiana.Lawson@gmail.com GITA Code of Ethics and Social Responsibility As a member of GITA, I promise: 1. To regularly attend GITA meetings 2. To participate to the best of my ability 3. To participate in team meetings and projects 4. To provide fellow members with helpful, constructive support and feedback 5. To help GITA members maintain a positive, friendly environment so all members can learn and grow 6. To serve (GITA) as an officer when called upon to do so 7. To treat fellow GITA members and its guests with courtesy and respect 8. To bring guests to member meetings so they can see the benefits that GITA membership has to offer (opportunity to recruit) 9. To maintain honest, highly ethical standards in all GITA meetings and activities GITA’s Mission to Empower All GITANOS • To gain real world experiences building solution-based projects which contribute to the industry. • To foster positive collaborative teamwork, and • To provide a vehicle for members to sharpen their communication skills. Newsletter Team Tiana Lawson Erica Sims Donna Landers Kevin Moore Jennifer Wilburn Find us on Facebook https://www.facebook.com/kaplanGITA