Blog

Blog Posts


Exchange 2010

Exchange 2010

As a Microsoft Gold Partner, New Signature gets to test drive products well in advance of their eventual release dates.  One of the best beta products we have had the pleasure of testing has been Exchange Server 2010, the latest update to Microsoft’s email server. It’s clear from the moment you download the product that … Read More

Network Security Starts With Education

Network Security Starts With Education

What often goes overlooked is the education aspect of network security, which is a shame, given it’s importance.  There are three types of security access controls: administrative, physical and technical. Much of the glitz falls upon technical controls, such as fancy software packages that utilize complex algorithms to encrypt data. Less energy is often … Read More

Pragmatic Information Technology Security

Pragmatic Information Technology Security

Properly trained and pragmatic security consultants, like the ones at New Signature, don’t use scare tactics to hype sell unnecessary services and products.  Instead we work with clients to understand their businesses, understand the real threats, take precautions to minimize the risks, and plan for the contingency if something does happen.   Most clients … Read More

Cybercrime Targeting Small to Mid-sized Businesses

Cybercrime Targeting Small to Mid-sized Businesses

Brian Krebs wrote a very relevant article on the Washington Post‘s Security Fix column yesterday titled “Tighter Security Urged for Businesses Banking Online“.  According to the article, “An industry group representing some of nation’s largest banks sent a private alert to its members last week warning about a surge in reported cybercrime targeting small … Read More

Network and Cyber Security Needs TLC

Network and Cyber Security Needs TLC

Many people tend to view technology, and specifically network or cyber security, as a one time event, much like the wiring of a building. The idea being that one would plan out an elegantly designed system, pay a contractor to implement it, and then walk away.   However, when it comes to technology and specifically … Read More