CoNetrix is built on the principles of integrity, innovation, and initiative.

CoNetrix is a full service computer networking, security and compliance firm built on the principles of integrity, innovation, and initiative. We specifically serve financial institutions as well as enterprises requiring a high level of security in their operations. Our employees are diligent in preserving the highest caliber of integrity, unassailable professional conduct, and personal conduct that is beyond reproach. Our entire business is based on trust that we will deliver on expectations, agreements, and promises.

BLOG

Notable Targeted Phishing Trickery and Mitigation Techniques

1/23/2020

CoNetrix recently assisted two customers with targeted phishing attacks in which the attackers attempted to redirect wire transfers. This activity is not new, however, some of the tactics utilized in the attack are noteworthy and provide insight into how organizations can better protect themselves. How did the attackers gain entry into corporate accounts? 

NEWS

CoNetrix Nominated for 2020 Cybersecurity Excellence Awards

1/16/2020

CoNetrix has been nominated in the 2020 Cybersecurity Excellence Awards recognizing companies, products, and individuals that demonstrate excellence, innovation, and leadership in the information security industry. The awards are produced by Cybersecurity Insiders in partnership with the Information Security Community on LinkedIn, tapping into the vast experience of over 400,000+ cybersecurity professionals to honor the world's best cybersecurity products, professionals and organizations.

BLOG

Confirmation: Citrix NetScaler directory traversal vulnerability (CVE-2019-19781)

1/15/2020

CoNetrix strongly recommends all your organization implement the appropriate mitigation measures for this confirmed vulnerability. CoNetrix has implemented the mitigation steps for all CoNetrix Technology and Aspire customers. On December 17, 2019, Citrix announced a directory traversal vulnerability in the Citrix Application Delivery Controller (formerly NetScaler ADC) and Citrix Gateway (formerly NetScaler Gateway) products. If exploited, this vulnerability could allow an unauthenticated attacker to perform arbitrary code execution. This is similar to the Fortigate vulnerability in 2019.

ARTICLE

Three Important Things to Consider when Reviewing Vendors’ BCPs

1/15/2020

Do you have outsourced technology services? If so, are you getting a copy of their business continuity plans?  More importantly, do you know what you're looking for when you review them? Due diligence document gathering and reviewing is a critical part of outsourcing. While the service is provided by another company, your institution still maintains responsibility, and ultimate accountability, to your customers. That's where due diligence documents come into play.

NEWS

CoNetrix Selected as Best IT/ Technology Services Company in Lubbock [2020]

1/9/2020

For the second consecutive year, CoNetrix is selected as the best IT/Technology Services Company in Lubbock, TX during the KCBD Best of the West competition. Each year, the public casts votes on the KCBD News Channel 11 website to select the best businesses in the Lubbock area. CoNetrix was selected as the best IT company in Lubbock, TX by those who participated.

BLOG

Not Receiving Google Mail messages with Geoblocking

12/30/2019

BLOG

Editing old GPOs with "Extra Registry Settings" configured using Powershell

12/30/2019

BLOG

FortiGates not connecting to FortiGuard

12/30/2019

BLOG

Fortigate VPNs using secondary public IP addresses

11/30/2019

When a secondary public IP address is utilized for VPN connections, the configuration of an IPSEC VPN versus an SSL VPN is quite different.  For an IPSEC VPN, it's as easy as turning flipping a switch and selecting the IP address:  

BLOG

Windows 10 Upgrade Failure Troubleshooting

11/26/2019

Windows 10 upgrades can fail for a number of reasons. Digging through the setup logs to determine the reason it failed can be frustrating and confusing. Microsoft has an application called "setupdiag" that will help you determine specifically what caused the upgrade to fail by parsing through the logs for you.https://docs.microsoft.com/en-us/windows/deployment/upgrade/setupdiag

BLOG

Exchange Maintenance with a Database Availability Group

11/26/2019

When doing maintenance on an Exchange server environment configured with a DAG, one of the things that you have to be aware of is how to temporarily remove one of the servers from the DAG before you disrupt any of the Exchange services (i.e. reboot) so that it doesn't inadvertently cause a failover of your databases or make some databases unavailable. Microsoft wrote a blog post a while back talking about the proper way to place an Exchange server into maintenance mode and it's a bit clunky - https://blogs.technet.microsoft.com/nawar/2014/03/30/exchange-2013-maintenance-mode/ 

BLOG

Choosing the right Penetration Test

11/22/2019

"You need a pen test. This is a vulnerability assessment. Have you considered Red Team testing?" You might have been told this by a regulatory examiner, your IT vendor, a senior partner, a Board member, or read it in an article. It's a common statement in the penetration testing space these days and with good reason. The scope and methodology of penetration tests is not standardized or regulated, so each provider can create their pen test service as they see fit. This puts more responsibility on you, the customer, to determine if they are meeting your needs.

Read News | Articles | Blog

CoNetrix maintains partnerships with leading technology vendors.

Microsoft
Cisco
Citrix
Netwrix
Dell
HP
Symantec
Veeam
VMWare
Zix
Netapp
Fortinet