Join CoNetrix for a six-part webinar training series for Information Security Officers (ISOs).
Learn More

CoNetrix is built on the principles of integrity, innovation, and initiative.

CoNetrix is a full service computer networking, security and compliance firm built on the principles of integrity, innovation, and initiative. We specifically serve financial institutions as well as enterprises requiring a high level of security in their operations. Our employees are diligent in preserving the highest caliber of integrity, unassailable professional conduct, and personal conduct that is beyond reproach. Our entire business is based on trust that we will deliver on expectations, agreements, and promises.

NEWS

CoNetrix Enters the BankNews 2018 Innovative Solutions Awards

8/14/2018

CoNetrix is pleased to announce two candidates for consideration in the BankNews 2018 Innovative Solutions Awards. The 2018 Innovative Solutions Awards, sponsored by BankNews, recognize companies that have introduced or significantly enhanced products designed to help community banks become more efficient, expand their capabilities and, ultimately, better serve their customers. The Innovative Solutions Awards are presented in five categories:

BLOG

How Financial Institutions Should Prepare for the Colorado Cybersecurity Regulation (HB 18-1128)

8/13/2018

What is Colorado Cybersecurity Regulation (HB 18-1128)? On January 19, 2018, the General Assembly of the State of Colorado introduced House Bill 18-1128, Concerning Strengthening Protections for Consumer Data Privacy. The regulation was signed into law on May 29, 2018 and goes into effect on September 1, 2018.

ARTICLE

Fighting (Alongside) The Users

7/31/2018

Several months ago, I stumbled across a comic that was a perfect representation of the battle institutions and IT departments face every day. It was a boxing ring, with a ring announcer introducing the participants in the corners of the ring. One corner contained firewalls, encryption, antivirus software, and other layers of data security while the opposing corner contained "Dave," a hapless user wearing a shirt emblazoned with the words "Human Error." This comic is both funny, because many of us know a "Dave," and disheartening, because no matter how much money and time are spent on network layout, configuration, and security, the harsh reality is it only takes one user on the other side of the mouse, clicking on the wrong item, to wreak havoc on your network. While incidents are still going to occur, they can be reduced with routine and thorough employee security awareness training.

BLOG

A More Accurate Method for Collecting Due Diligence Documents from Third Parties

7/11/2018

How do you know what due diligence documents to gather from each of your vendors? There are many methods available, but some result in more accurate documentation than others. Today, I'm going to review two of the primary methods and discuss the effectiveness of each method. Method #1: The Bucket Method

BLOG

5 Essential Information Security Best Practices as a Financial Institution ISO

6/22/2018

Early this year the tech world was rocked with the announcement of two unprecedented vulnerabilities named Meltdown and Spectre. These two vulnerabilities are a big deal because they are hardware vulnerabilities affecting any device with a silicon chip. This includes microprocessors on workstations and servers, mobile phones, tablets, cloud services, and other platforms.

BLOG

AT&T Switched Ethernet Network on Demand

6/11/2018

One of our Technology customers recently migrated to a new AT&T WAN offering called AT&T Switched Ethernet – Network on Demand (ASE NoD). This is the most recent evolution of their metro Ethernet service with the addition of long-distance layer 2 connections.

BLOG

Removable media access denied after removing restrictions

6/11/2018

I have encountered issues on PCs that can't access CDs or flash drives that previously had removable media access restricted by either group policy or Symantec Endpoint device control. After the control restrictions were removed, trying to read from the CD or flash drive gave an "Access Denied" error.

BLOG

Microsoft Appraiser Script - Windows 10 upgrade error - 0xc1900208

6/11/2018

If you run the Windows 10 Upgrade Assistant and get an error code 0xc1900208. This means there is a compatibility issue with an application and the install is being blocked! The only way to figure out what program is blocking it is to run a powershell script by Microsoft called Appraiser https://msdnshared.blob.core.windows.net/media/2018/03/AppRPS.zip

BLOG

New Windows Admin Center

6/11/2018

Recently, Microsoft released a production version of a new management interface called Windows Admin Center, formerly known as Project Honolulu. The purpose of this product is to provide a centralized or locally-deployed management interface that will (eventually, hopefully) replace Server Manager. It manages servers by using Remote PowerShell or WMI over WinRM and client systems through similar methods.

BLOG

Windows 10 can't click on link in Office documents

6/11/2018

After installing each Windows 10 creator's update, I get the following error message when I try to click on any link in any email message or click on a table of contents link in a Word doc:

BLOG

Local admin account can't run Edge browser in Windows 10

6/11/2018

I was configuring a new Windows 10 PC for a customer and logged in under the local administrator account. I tried to open Edge but received a notification that Edge could not be opened by the built-in administrator account.

BLOG

Review your Vendor’s SOC Report (SSAE 18) in 15 Minutes

6/7/2018

Ideally, reviewing a SOC Report will take you 15 minutes or less (once you get the hang of it). If you are a financial institution and you have vendors, then you have plenty of SOC Reports to review every year.

Read News | Articles | Blog

CoNetrix maintains partnerships with leading technology vendors.

Microsoft
Cisco
Citrix
Netwrix
Dell
HP
Symantec
Veeam
VMWare
Zix
Netapp
Fortinet