CoNetrix is built on the principles of integrity, innovation, and initiative.

CoNetrix is a full service computer networking, security and compliance firm built on the principles of integrity, innovation, and initiative. We specifically serve financial institutions as well as enterprises requiring a high level of security in their operations. Our employees are diligent in preserving the highest caliber of integrity, unassailable professional conduct, and personal conduct that is beyond reproach. Our entire business is based on trust that we will deliver on expectations, agreements, and promises.

BLOG

Is DIY Cybersecurity Monitoring Possible? — SIEM Tools vs. Managed Solutions

10/10/2019

BLOG

How to make checkboxes in Microsoft Word

10/10/2019

I was needing to add some interactive check boxes to a Word document, but found out that they only show up in the "Developer" menu, which does not show up by default in Word. To add the "Developer" tab menu, you must follow the following steps:  

BLOG

Installing certificates on a FortiGate managed by FortiManager

10/10/2019

NEWS

CoNetrix Champions National Cybersecurity Awareness Month 2019

10/3/2019

CoNetrix celebrates National Cybersecurity Awareness Month (NCSAM) 2019 by becoming a Champion and offering complimentary resources for cybersecurity resilience. CoNetrix joins the global effort, along with businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals, to promote the awareness of online safety and privacy.

BLOG

How to Determine if Information Disclosure Warrants Notification

9/17/2019

Unauthorized individuals have accessed nonpublic information, who do you notify? Whether it be documents discovered in dumpsters that should have been shredded, ransomware holding information hostage, or a tornado that blew files all over the county. Definition of Information

BLOG

Confirmation: Remotely-Exploitable Fortinet SSL VPN Vulnerability

9/9/2019

On May 24, 2019, Fortinet published an advisory stating that certain versions of their FortiOS software are vulnerable to a path traversal attack which allows an attacker to download system files through specially crafted HTTP requests. The vulnerability is only present when the SSL VPN service is enabled – either web-mode or tunnel-mode. The vulnerable FortiOS versions and the corresponding patched versions are:

BLOG

Removing Built-in Windows 10 apps using PowerShell

9/3/2019

BLOG

HP Server Red Screen of Death

9/3/2019

After an HVAC crew at a customer's DR site triggered multiple power outages, their recently repurposed ESX host (an HP ProLiant DL360 G9), which wasn't connected to a UPS at the time, would no longer pass POST. It would stop at 'Loading System Firmware Modules' before faulting and hitting the RSoD. After trying multiple options we thought the power surges/outages might've caused a hardware failure, but the errors from the RSoD didn't seem to indicate this to be the case. I found a related article (https://support.hpe.com/hpsc/doc/public/display?docId=mmr_kc-0128466) that is geared toward issues relating to BL460c's not being able to POST after firmware upgrades, and decided it was worth a shot before going down the hardware replacement route.

BLOG

Removing the Shutdown option in Windows 10

9/3/2019

BLOG

22 Texas Cities Compromised by Ransomware - How to Protect Your Business

8/27/2019

It was announced on August 16th that 22 Texas cities were attacked and infected with ransomware, rendering many of their municipal IT systems unavailable to conduct daily business. The mayor of one of these cities has said the ransom request was $2.5 million to unlock their files. The Texas Department of Information Resources believes this was a coordinated attack by a single threat actor. Source: https://dir.texas.gov/View-About-DIR/Article-Detail.aspx?id=209

NEWS

CoNetrix Technology Releases New Cybersecurity Monitoring and Compliance Solution

8/20/2019

After a lot of work and testing, CoNetrix Technology is pleased to announce the release of its new Cybersecurity Monitoring and Compliance solution. The new solution is being offered in response to customer needs for a security incident detection service. With the new service, customers will have access to new options for security information and event management (SIEM) and security operations centers (SOC). SIEM-as-a Service and SOC-as-a Service options are available for organizations that need a fully hosted solution with monitoring and management. SIEM management is also available for companies that already have a SIEM platform and just need help with management and monitoring.

BLOG

Cybersecurity Threats and How Technology is Evolving in 2019

8/12/2019

The world of cybersecurity has had some fundamental shifts in the past several years that have made the vast majority of companies unprepared for today's threats. The extensive use of malware, for example, has dramatically reduced the value of traditional security solutions, such as firewalls, IDS/IPS, and anti-virus software. These solutions that used to adequately prevent attacks are now very limited in their risk mitigation value. Many organizations have not updated their cybersecurity technology and solutions to stop today's threats. It's like monitoring your front door for a break in while someone comes in through the back window.

Read News | Articles | Blog

CoNetrix maintains partnerships with leading technology vendors.

Microsoft
Cisco
Citrix
Netwrix
Dell
HP
Symantec
Veeam
VMWare
Zix
Netapp
Fortinet