CoNetrix is built on the principles of integrity, innovation, and initiative.

CoNetrix is a full service computer networking, security and compliance firm built on the principles of integrity, innovation, and initiative. We specically serve financial institutions as well as enterprises requiring a high level of security in their operations.

ARTICLE

Cybersecurity customer education: A marketing campaign?

12/5/2016

One of the difficult tasks banks continue to face is how do you educate your customers on the importance of cybersecurity? You send inserts with your statements and provide pamphlets in your brick and mortar branch, but what is being absorbed?  

ARTICLE

Encryption is the Bees’ Knees

12/2/2016

  We know encryption is the bees’ knees, that’s why we’ve been coming up with ways to encrypt messages since the time of ancient Greeks. But do our coworkers and family members understand what it means to use encryption in today’s technology landscape, if they’re using encryption at all?

NEWS

Tia Clary named CFO for CoNetrix, LLC

11/17/2016

Lubbock, Texas - CoNetrix, LLC announced Tia Clary has been named as Chief Financial Officer for CoNetrix. The announcement came October 18, 2016 during a Management Team meeting. Clary has been with CoNetrix since February 2014, when she began working as Controller.

BLOG

Using VMRC to connect to the VMware console

11/11/2016

This is handy if you need to quickly connect to the console of a VM and don't need any other features of the vSphere web interface. The documentation from VMware says to run this from the web interface, but it can be run standalone, like this: "C:\Program Files (x86)\VMware\VMware Remote Console\vmrc.exe" "vmrc://DOMAIN\USERNAME@VCENTER.DOMAIN.COM/?moid=vm-VMID"

BLOG

Error "access denied" when encrypting with BitLocker

11/11/2016

For some versions of the TPM chip found in the Lenovo ThinkPad T420, you will receive an Access Denied error message when attempting to encrypt the hard disk if you have a group policy enabled that restricts CD/DVD access.  Apparently, some models of TPM chip are seen by the system as a CD/DVD device, and will not function correctly if it has been disabled via Group Policy. 

BLOG

Problem with VMware ESXi v5.5 update 3B and HP storage driver

11/11/2016

I recently updated a standalone ESXi 5.5 server through command line patching.  After the ESXi server rebooted and came back online, it showed no datastore and no access to virtual machine disks.  I found a post about ESXi 6 updates causing similar issue when the HP Storage Array drivers had been removed during the update process. Since I still had my update logs pulled up in console window, I was able to locate a line that said "VIBs Removed: Hewlett-Packard bootbank scsi-hpsa <version>".

ARTICLE

Strengthening the Resilience of Outsourced Technology Services

11/9/2016

On February 6, 2015, the FFIEC issued a new appendix titled "Strengthening the Resilience of Outsourced Technology Services" to the "Business Continuity Planning" booklet of the FFIEC Information Technology Examination Handbook. This new appendix discusses the following four key elements financial institutions should address related to Technology Service Providers (TSPs). Third-Party Management

ARTICLE

Gone Phishing

11/9/2016

Phishing attacks are a part of everyday life, and according the “Global Phishing Survey 2H2013: Trends and Domain Name Use” by Anti-Phishing Working Group (APWG), the banking industry is the primary target of these types of attacks. So, what are phishing attacks and how can we protect our banks against these attacks?

ARTICLE

Third-Party Relationships: Risk Management Guidance The Readers Digest Version

11/9/2016

Recently we have seen a focus on vendor management during exams. Regulators have been concerned the quality of third-party risk management practices may not be keeping pace with the increasing level of risk and complexity of these relationships. As a result of this concern and new focus, the OCC released a Bulletin titled “Third-Party Relationships: Risk Management Guidance” on October 30, 2013. The bulletin provides guidance for assessing and managing risks associated with third-party relationships.

ARTICLE

Information Security A 21 Question Self-Assessment

11/9/2016

Information security is a significant business risk that demands our attention. But too many times, the personnel tasked to oversee information security don’t have the time, resources or knowledge to do the job right. Although this article cannot provide the time or knowledge needed to make a true evaluation, it can help get the internal conversation stared. Answering the following 21 questions can help you measure your overall information security posture.

ARTICLE

Bring Your Own Device Personal or Business?

11/9/2016

Bring Your Own Device (BYOD) is a hot topic in businesses today. I think every security and technology conference I have attended over the past few months has had a session over BYOD. One of the recent ones I went to labeled their session “BYOD, Bring Your own Device or Disaster?” In the session, like many others, the presenter discussed some of the issues related to introducing personal devices into a business. I think the issue escalates even more within the financial sector as confidentiality and security are more important. By allowing employees to use their personal devices for bank-related activities (e.g. email, access to the network, bank applications, etc.), the bank must deal with security issues, which can conflict with employees’ personal expectations.

ARTICLE

FFIEC Social Media Proposed Guidance - the Reader’s Digest Version

11/9/2016

In January, the Federal Financial Institutions Examination Council (FFIEC) released proposed guidance titled, Social Media: Consumer Compliance Risk Management Guidance.  According to the FFIEC, the proposed guidance "is intended to help financial institutions understand potential consumer compliance and legal risks, as well as related risks, such as reputation and operational risks associated with the use of social media, along with expectations for managing those risks."

Read News | Articles | Blog

CoNetrix maintains partnerships with leading technology vendors.

Microsoft
Cisco
Citrix
Barracuda
Dell
HP
Symantec
Veeam
VMWare
ZixCorp
Netapp
Fortinet