Your IT Consultant

Information Technology Blog
by John W. Simek, Vice President of Sensei Enterprises, Inc.

Recent Posts

Aug 09, 2018

Easier to Crack WPA/WPA2 than Previously Thought

We already knew that WPA2 was susceptible to cracking (Krack Attack) last year. It's bad enough that WPA2 is vulnerable,

Read More

Aug 08, 2018

Promotion: SpiderOak Unlimited Backup for $179

Cloud storage has become pretty popular the last few years. Even though cloud storage is relatively cheap, you do need

Read More

Aug 07, 2018

Google Announces Android P Name

Well, the rumors are over. Google has historically named the Android operating system using a letter of the alphabet and

Read More

Aug 06, 2018

15 Things to Avoid Being Hacked

Times have changed. The bad guys are constantly trying to attack your computing devices and mobile phones. The goal is

Read More

Aug 02, 2018

Edge Now Supports Sign-in Without a Password

Everybody wants to jump on the truck and support login credentials with something other than just a user ID and

Read More

Aug 01, 2018

Galaxy S10 Feature Not Available on an iPhone

The Samsung Apple battle continues for another year. Apple introduced its iPhone X (call it ten to tick off the

Read More

Jul 31, 2018

Three VPN Deals for Everybody

I've often said that everybody needs some sort of VPN service to protect data transmissions. The issue is cost for

Read More

Jul 30, 2018

Turn Off Those Distracting Outlook Message Notifications

By default, Outlook has all kinds of ways to let you know you have a message. The problem is that

Read More

Jul 26, 2018

Free Chrome Extension Prevents Cryptojacking

Ransomware is still prevalent, however there is a new favorite attack that is gaining in popularity. Cryptojacking is where your

Read More

Jul 25, 2018

Bluetooth Pairing Vulnerable to Attack

Threatpost reported that researchers at the Israel Institute of Technology have identified a security vulnerability in the Bluetooth specification. The

Read More

Jul 24, 2018

Hmmmm….Can’t Recover Data From a Broken New MacBook Pro

One of the things we do is digital forensics. That may mean recovering data from "dead" drives or otherwise inaccessible

Read More

Jul 23, 2018

Which 16 Popular VPNs Leak Data?

Secure communications means encrypting the data stream. You definitely want to consider using a VPN if you are concerned about

Read More