CoNetrix K.E.Y.S. Conference
April 5-7, 2017
Register

CoNetrix is built on the principles of integrity, innovation, and initiative.

CoNetrix is a full service computer networking, security and compliance firm built on the principles of integrity, innovation, and initiative. We specifically serve financial institutions as well as enterprises requiring a high level of security in their operations.

BLOG

Cisco Hardware Issue with Clock Signal Component

2/3/2017

NEWS

CoNetrix Renews Microsoft Gold Partnership

1/18/2017

CoNetrix, a leader in information security and technology, announced today it has attained the Gold Application Development and Silver Datacenter competencies from Microsoft.  This signifies the 11th straight year for CoNetrix to attained the Microsoft Gold Certified Partner Status. Microsoft Gold Certified Partners represent the highest level of competence and expertise with Microsoft technologies and have the closest working relationship with Microsoft. At this level, CoNetrix has access to the resources and support needed to provide its customers with the highest level of services for Microsoft products and solutions.

ARTICLE

Is Our Bank Website ADA Compliant?

1/5/2017

  There has been a lot of attention on website ADA compliance over the past few months.  Several community banks have received demanding letters from law firms alleging the bank is violating the Americans with Disabilities Act (ADA).  Purportedly these letters claim that unless the bank modifies its website to meet the World Wide Web Consortium’s Web Content Accessibility Guidelines (WCAG), the bank will continue to violate ADA.  So, what does this mean?  Let’s take a look at some common questions banks are asking about ADA compliance.

ARTICLE

Website ADA Compliance: A Policy Perspective.

1/5/2017

ADA website accessibility is a trending topic in the community banking industry. Why? Recently several financial institutions have received letters threatening lawsuits because banking websites are not “accessible.” The Americans with Disabilities Act (ADA), enacted in 1990, is a civil rights law created to prohibit discrimination against individuals with disabilities. In 2010, the Department of Justice (DOJ) initiated the rulemaking process concerning website accessibility. This process consists of calls for public comments on proposed rules, impact and cost analysis, and finally acceptance into the federal register. Since 2010, the process has been continually delayed. As of right now, finalized rules are expected to be released sometime in 2018, leaving no clear guidelines to follow at the moment. Without these guidelines in place, how can your bank protect itself from opportunistic legal battles while committing to provide an accessible site to your customers? Accessibility policies and vendor management are the answer.

ARTICLE

Information Security is On Fleek: Interpreting the New Booklet

1/1/2017

  If you spend much time with teenagers, you know they use a special version of the English language. A few months ago, I was introduced to the term “on fleek.” Personally, I never liked it, but by the time I worked up enough courage to use the term in a conversation, I was informed, “Alyssa, ‘on fleek’ is so last year. Now, we say ‘lit’.” (Rolling my eyes here.) While both terms can be used to describe something “awesome,” I tell you this to emphasize how difficult it can be to understand another language.

ARTICLE

I_H8t3_P@ssw0rds!

12/31/2016

  Raise your hand if you are tired of constantly changing your password and sticking to whatever arbitrary rules seem to be in place at the time. Okay, now put your hand down because you are most likely drawing unnecessary attention to yourself, especially if you are in a coffee shop or on your couch at home surrounded by family. Everyone seems to grumble about password length and expirations, but the truth is: strong passwords are a necessary complication and their use isn’t going away anytime soon. If anything, password complexity guidelines are shifting to be even more stringent, although there may be some light at the end of the extremely long tunnel.

BLOG

Access denied when shadowing Remote Desktop with dual monitors

12/26/2016

Recently, a customer said they were no longer able to shadow remote desktop sessions for some new thin clients that were installed.  The error message was "Access is Denied".  It turns out that these new thin clients were dual monitor setups.

BLOG

Unable to click on a link in Office documents

12/26/2016

After installing Windows 10 and Office on a new laptop, I started getting the following error message when I tried to click on any link in any email message or click on a table of contents link in a Word doc:

BLOG

VMware ESX v6 Embedded Host Client (EHC)

12/26/2016

I was recently working on a project to migrate a customer from a physical server to new virtual servers on a new ESX host. I installed ESXi 6.0 Update 2 on the new physical server and delivered to the customer site. After the server was onsite, I began building my first virtual machine. Since it was the first virtual machines and vCenter was not installed yet, I downloaded the VI client and connected to the host.

BLOG

Saving Windows 10 lock screen images

12/26/2016

Windows 10 includes a Spotlight feature to provide random background images that appear on the lock screen. Some of these images are very nice so I found a way to save them for use on other devices like a phone or tablet.

BLOG

Shadowing sessions in Windows Server 2012 R2

12/26/2016

The traditional method of opening Windows Task Manager, going to the Users tab, right clicking the user, and clicking Remote Control is no longer and option on Windows Server 2012 R2. To shadow a session in Windows Server 2012 R2, you must use the "mstsc" command with the /shadow switch. First, open Windows Task Manager and go to the Users tab. Find the ID of the user you wish to shadow and remember this number. Then, from RUN or a Command Prompt, type “mstsc /shadow:<session id>”. The user will be prompted to allow you to shadow their session. This will work on Remote Desktop and normal servers.

ARTICLE

Cybersecurity customer education: A marketing campaign?

12/19/2016

One of the difficult tasks banks continue to face is how do you educate your customers on the importance of cybersecurity? You send inserts with your statements and provide pamphlets in your brick and mortar branch, but what is being absorbed?  

Read News | Articles | Blog

CoNetrix maintains partnerships with leading technology vendors.

Microsoft
Cisco
Citrix
Barracuda
Dell
HP
Symantec
Veeam
VMWare
ZixCorp
Netapp
Fortinet