Your IT Consultant

Information Technology Blog
by John W. Simek, Vice President of Sensei Enterprises, Inc.

Recent Posts

Aug 11, 2022

Google Pressures Apple to Use RCS Protocol

As reported by The Register, most of the mobile communications world uses Rich Communications Services (RCS) for text messages, but

Read More

Aug 10, 2022

Printers Are Network Access Devices Too

Essentially, a modern day printer is another computer device connected to your network. That means it’s a potential access point

Read More

Aug 09, 2022

Get Rid of the Focused Inbox for Outlook

Several years ago, Microsoft implemented the “feature” of a focused Inbox for Outlook. The intent is to keep all of

Read More

Aug 04, 2022

New Version of Winamp Available for Download

Believe it or not, there is more to life than streaming music over the internet. Back in the day, users

Read More

Aug 03, 2022

Attackers Shifting Away from Using Microsoft Office Macros

A mark of success is the ability to be flexible. Microsoft has decided to turn off the ability to execute

Read More

Aug 02, 2022

Uber Receipts Can Kill Microsoft Outlook

As the story goes, it hurts when you beat your head against a wall. If you want the pain to

Read More

Jul 28, 2022

Ransomware Resource: No More Ransom

It is crazy scary how fast ransomware attacks are growing. There are many things you should be doing to help

Read More

Jul 27, 2022

Change Your Default Search Engine to DuckDuckGo

We really don’t know what information software is capturing about our activity. Facebook got caught with its pants down with

Read More

Jul 26, 2022

Recent Windows Update May Break USB Printing

Life is full of inconveniences. Bleeping Computer reports that some users may experience problems with USB printing after applying a

Read More

Jul 21, 2022

Can You Name Your Wi-Fi Networks Using Emojis?

It’s a good security practice to name your Wi-Fi network with something that does not give a clue as to

Read More

Jul 20, 2022

Certified Ethical Hacker Company Not So Ethical

EC-Council runs the Certified Ethical Hacker (CEH) program, which is one of the more popular and “sexy” cybersecurity certifications on

Read More

Jul 19, 2022

Enforcing Password History Can Curb Reuse

The demise of passwords has been touted as the future of authentication. I’ve heard that story for many years and

Read More