Blog

Blog Posts


Pragmatic Information Technology Security

Pragmatic Information Technology Security

Properly trained and pragmatic security consultants, like the ones at New Signature, don’t use scare tactics to hype sell unnecessary services and products.  Instead we work with clients to understand their businesses, understand the real threats, take precautions to minimize the risks, and plan for the contingency if something does happen.   Most clients … Read More

Cybercrime Targeting Small to Mid-sized Businesses

Cybercrime Targeting Small to Mid-sized Businesses

Brian Krebs wrote a very relevant article on the Washington Post‘s Security Fix column yesterday titled “Tighter Security Urged for Businesses Banking Online“.  According to the article, “An industry group representing some of nation’s largest banks sent a private alert to its members last week warning about a surge in reported cybercrime targeting small … Read More

Network and Cyber Security Needs TLC

Network and Cyber Security Needs TLC

Many people tend to view technology, and specifically network or cyber security, as a one time event, much like the wiring of a building. The idea being that one would plan out an elegantly designed system, pay a contractor to implement it, and then walk away.   However, when it comes to technology and specifically … Read More

Network Security: Passwords vs. Passphrases

Network Security: Passwords vs. Passphrases

Passwords tend to be the area where security-minded people annoy customers the most. There’s often tension around: Password complexity requirement Password length requirements Password expiration requirements Setting these up could easily push your staff into a complete revolt without the proper planning and training. Too often, management decides to focus on security and institutes … Read More

New Signature's CEO Guest Blogs on getpickd

New Signature's CEO Guest Blogs on getpickd

New Signature’s CEO, Christopher Hertz, contributed as a guest columnist on the getpickd blog with his post “Common mistakes. Easy fixes. (part two) — Warning: Arriving early to an interview may adversely affect your chances of being hired. ”  The blog post has been picked up by the popular blogs: Consumerist and Liferhacker. The … Read More

Network Security: Confidentiality vs. Availability

Network Security: Confidentiality vs. Availability

In the IT security world, there is a constant tension between the need to keep information confidential and the need to have it readily available. These form two of the vaunted three legs (the other being “integrity”) of every security practicioner’s model. One of the reasons these two concepts seem to be at odds … Read More

Information Technology Audit Policies

Information Technology Audit Policies

In the information technology (IT) industry, auditing is a task that’s mostly misunderstood until too late. Properly configured, a solid IT audit policy can help organizations: Know when users are created or deleted Determine if malicious activity is taking place on the network Perform a post-mortem analysis in the event of a server failure … Read More

Defense in Depth

Defense in Depth

In the previous millennium, as networks of personal computers began to become commonplace, the security situation for many companies worsened. The problem was two-fold.  First, instead of using dumb-terminals to access computer resources, users now had machines that were capable of crashing, slowing down and even creating network problems. Secondly, instead of just having … Read More