Your IT Consultant

Information Technology Blog
by John W. Simek, Vice President of Sensei Enterprises, Inc.

Recent Posts

Mar 01, 2017

Patch Your Password Manager Now!

You should be using a password manager to store all of your logon credentials and other pieces of important digital

Read More

Feb 28, 2017

Windows 10 Can Control Which Win32 Apps Can Be Installed

A major headache for system administrators is controlling what employees install on their devices. It doesn't matter what the firm's

Read More

Feb 27, 2017

Amazon Alexa Hit the 10,000 Skills Mark

Third party developers can add additional features to Alexa by coding a "skill." As an Alexa user, you then go

Read More

Feb 23, 2017

Can You Recognize a Phishing E-mail?

According to Verizon's 2016 Data Breach Investigations Report, 30 percent of phishing e-mails are opened. That's a pretty staggering number.

Read More

Feb 22, 2017

Stop Autoplaying Facebook Videos

One of the most annoying things that can happen while surfing the Internet are video files that automatically play when

Read More

Feb 21, 2017

No More JavaScript Attachments for Gmail Users

Malware infections typically come from hyperlinks in an e-mail message that download the bad stuff. Attachments with a malicious payloads

Read More

Feb 16, 2017

Office 365 and G Suite Comparison

InfoWorld has published a post that details a comparison of the capabilities and differences of Office 365 and Google's G

Read More

Feb 15, 2017

CosmoLex Practice Management Integrates Bank Data Feeds

Leave it to our friend and colleague Bob Ambrogi to once again scoop the news in legal technology. Bob reports

Read More

Feb 14, 2017

Mac Users Not Immune to Viruses Despite Past Beliefs

For years and years, Apple users have believed that Macs are so secure that they are immune to malware infection.

Read More

Feb 13, 2017

Apple Caught Saving User Data without Permission Again

Computer forensics company Elcomsoft warned that Apple has been saving Safari browser history for over a year even though users

Read More

Feb 09, 2017

Signal Encrypted Communication Moving to Video

I'm a big fan of Signal, the encrypted text and voice communication application by Open Whisper System. So is Edward

Read More

Feb 08, 2017

76 iOS Apps Vulnerable to Traffic Interception

Transport Layer Security (TLS) is the current method for protecting communications, which has superseded Secure Socket Layer (SSL). Researchers have

Read More