CoNetrix is a full service computer networking, security and compliance firm built on the principles of integrity, innovation, and initiative. We specifically serve financial institutions as well as enterprises requiring a high level of security in their operations. Our employees are diligent in preserving the highest caliber of integrity, unassailable professional conduct, and personal conduct that is beyond reproach. Our entire business is based on trust that we will deliver on expectations, agreements, and promises.
I was needing to add some interactive check boxes to a Word document, but found out that they only show up in the "Developer" menu, which does not show up by default in Word. To add the "Developer" tab menu, you must follow the following steps:
CoNetrix celebrates National Cybersecurity Awareness Month (NCSAM) 2019 by becoming a Champion and offering complimentary resources for cybersecurity resilience. CoNetrix joins the global effort, along with businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals, to promote the awareness of online safety and privacy.
Unauthorized individuals have accessed nonpublic information, who do you notify? Whether it be documents discovered in dumpsters that should have been shredded, ransomware holding information hostage, or a tornado that blew files all over the county. Definition of Information
On May 24, 2019, Fortinet published an advisory stating that certain versions of their FortiOS software are vulnerable to a path traversal attack which allows an attacker to download system files through specially crafted HTTP requests. The vulnerability is only present when the SSL VPN service is enabled – either web-mode or tunnel-mode. The vulnerable FortiOS versions and the corresponding patched versions are:
After an HVAC crew at a customer's DR site triggered multiple power outages, their recently repurposed ESX host (an HP ProLiant DL360 G9), which wasn't connected to a UPS at the time, would no longer pass POST. It would stop at 'Loading System Firmware Modules' before faulting and hitting the RSoD. After trying multiple options we thought the power surges/outages might've caused a hardware failure, but the errors from the RSoD didn't seem to indicate this to be the case. I found a related article (https://support.hpe.com/hpsc/doc/public/display?docId=mmr_kc-0128466) that is geared toward issues relating to BL460c's not being able to POST after firmware upgrades, and decided it was worth a shot before going down the hardware replacement route.
It was announced on August 16th that 22 Texas cities were attacked and infected with ransomware, rendering many of their municipal IT systems unavailable to conduct daily business. The mayor of one of these cities has said the ransom request was $2.5 million to unlock their files. The Texas Department of Information Resources believes this was a coordinated attack by a single threat actor. Source: https://dir.texas.gov/View-About-DIR/Article-Detail.aspx?id=209
After a lot of work and testing, CoNetrix Technology is pleased to announce the release of its new Cybersecurity Monitoring and Compliance solution. The new solution is being offered in response to customer needs for a security incident detection service. With the new service, customers will have access to new options for security information and event management (SIEM) and security operations centers (SOC). SIEM-as-a Service and SOC-as-a Service options are available for organizations that need a fully hosted solution with monitoring and management. SIEM management is also available for companies that already have a SIEM platform and just need help with management and monitoring.
The world of cybersecurity has had some fundamental shifts in the past several years that have made the vast majority of companies unprepared for today's threats. The extensive use of malware, for example, has dramatically reduced the value of traditional security solutions, such as firewalls, IDS/IPS, and anti-virus software. These solutions that used to adequately prevent attacks are now very limited in their risk mitigation value. Many organizations have not updated their cybersecurity technology and solutions to stop today's threats. It's like monitoring your front door for a break in while someone comes in through the back window.
I just worked with the best CoNetrix auditor who was completely prepared upon arrival having reviewed ALL the documents that I provided ahead of time. I was informed of issues as they were discovered and had time for discussion. Bankers don't like surprises at an exit meeting. In fact, we even had a pre-exit meeting which was a great tool as we were able to include our Network Vendor who was able to address some of the findings immediately.
$295 million Bank in Texas
Great first-time experience; great staff communication; very prompt on reports.
$216 million FDIC bank in Louisiana
We could not be happier with the service and report quality that we get!!! Also, I love Tandem and have seen first hand how it has helped with our regulators and their understanding of our system.
$190 million Federal Reserve bank in Texas
[Both auditors] were great and have been excellent resources for additional information I have asked for. They are both consummate professionals. The audit process applied was extremely thorough and organized. The results we received will certainly help us make our organization stronger and more secure.
$1.8Bil Credit Union in South Carolina