Your IT Consultant

Information Technology Blog
by John W. Simek, Vice President of Sensei Enterprises, Inc.

Recent Posts

Apr 25, 2016

State of Application Security

Shane Owens, of Arxan, sent me a link to some wonderful resources for application security. This is Arxan's 5th Application

Read More

Apr 21, 2016

New Law Practice Management Solution from Citrix

Our friend and colleague, Bob Ambrogi, has done it again. Bob is always on top of the latest and greatest

Read More

Apr 20, 2016

Cloud Security Compromised by URL Shorteners

I have never been a fan of shortened URLs since you really have no clue where you will end up

Read More

Apr 19, 2016

Royal Canadian Mounted Police Can Crack BlackBerry Messenger Encryption

The battle over encryption is still white hot even though the FBI announced that they were able to crack into

Read More

Apr 18, 2016

Uninstall Apple QuickTime for Windows – Now!

Apple hasn't patched QuickTime for Windows for the past several months and apparently has no intention of ever doing it

Read More

Apr 14, 2016

Create a Recovery Drive for Your Windows 10 Device

If you have a perfectly good running Windows 10 device, now is a good time to create a recovery disk.

Read More

Apr 13, 2016

Get the Peyta Ransomware Decrypt Password for Free

Peyta is a pretty scary infection that takes ransomware to a new level. It not only encrypts your data, but

Read More

Apr 12, 2016

Best Practices for Cloud SLAs (Service Level Agreements)

Despite what almost 50% of the public believe, the "cloud" is not impacted by weather. Working in the cloud means

Read More

Apr 11, 2016

Emergency Update for Flash

Adobe has issued an emergency update for Flash. The patch addresses a critical zero-day vulnerability. More and more people are

Read More

Apr 07, 2016

Google Calendar Reminders Not Just for Mobile Devices

If you used Google's Calendar app on an iOS or Android device, you enjoyed having a to-do list ability known

Read More

Apr 06, 2016

End-to-end Encryption for WhatsApp

A lot of technology providers have promised to protect users' privacy, primarily through the use of encryption. Alphabet (I'll never

Read More

Apr 05, 2016

Another Tool to Prevent Ransomware Infection

The carbon-based units (humans) are the largest risk for ransomware infection. You can train and train, but some idiot is

Read More