John W. Simek

OK
About John W. Simek
Since 1997, I have been the Vice President of Sensei Enterprises, Inc. a digital forensics, managed information technology and cybersecurity company. I have authored 18 books and written hundreds of articles over the last 20+ years. I travel throughout North America lecturing on various subjects, mostly dealing with technology, security and electronic evidence. I enjoy dealing with digital forensics, security and providing expert testimony in court. I'm also a co-host of the Digital Detectives podcast on Legal Talk Network.
Specialties: Digital forensics, electronic evidence, electronic discovery, expert witness, author, speaker
Are you an author?
Author Updates
-
-
Blog postEssentially, a modern day printer is another computer device connected to your network. That means it’s a potential access point
The post Printers Are Network Access Devices Too appeared first on Sensei Enterprises, Inc..
Related StoriesAttackers Shifting Away from Using Microsoft Office MacrosRansomware Resource: No More RansomRecent Windows Update May Break USB Printing5 hours ago Read more -
Blog postSeveral years ago, Microsoft implemented the “feature” of a focused Inbox for Outlook. The intent is to keep all of
The post Get Rid of the Focused Inbox for Outlook appeared first on Sensei Enterprises, Inc..
Related StoriesUber Receipts Can Kill Microsoft OutlookNew Version of Winamp Available for DownloadCheat Sheet Available for Word for Microsoft 365Yesterday Read more -
Blog postBelieve it or not, there is more to life than streaming music over the internet. Back in the day, users
The post New Version of Winamp Available for Download appeared first on Sensei Enterprises, Inc..
Related StoriesGet Rid of the Focused Inbox for OutlookUber Receipts Can Kill Microsoft OutlookRansomware Resource: No More Ransom6 days ago Read more -
Blog postA mark of success is the ability to be flexible. Microsoft has decided to turn off the ability to execute
The post Attackers Shifting Away from Using Microsoft Office Macros appeared first on Sensei Enterprises, Inc..
Related StoriesMicrosoft July 2022 Patch TuesdayGet Rid of the Focused Inbox for OutlookUber Receipts Can Kill Microsoft Outlook1 week ago Read more -
Blog postAs the story goes, it hurts when you beat your head against a wall. If you want the pain to
The post Uber Receipts Can Kill Microsoft Outlook appeared first on Sensei Enterprises, Inc..
Related StoriesGet Rid of the Focused Inbox for OutlookNew Version of Winamp Available for DownloadCheat Sheet Available for Word for Microsoft 3651 week ago Read more -
Blog postIt is crazy scary how fast ransomware attacks are growing. There are many things you should be doing to help
The post Ransomware Resource: No More Ransom appeared first on Sensei Enterprises, Inc..
Related StoriesGet Rid of the Focused Inbox for OutlookNew Version of Winamp Available for DownloadAttackers Shifting Away from Using Microsoft Office Macros1 week ago Read more -
Blog postWe really don’t know what information software is capturing about our activity. Facebook got caught with its pants down with
The post Change Your Default Search Engine to DuckDuckGo appeared first on Sensei Enterprises, Inc..
Related StoriesNew Firefox Privacy Feature ReleasedAnnoying Cookie Banners Blocked with a Browser ExtensionMicrosoft Edge is Second Most Popular Desktop Browser2 weeks ago Read more -
Blog postLife is full of inconveniences. Bleeping Computer reports that some users may experience problems with USB printing after applying a
The post Recent Windows Update May Break USB Printing appeared first on Sensei Enterprises, Inc..
Related StoriesMicrosoft Pushing to Require SSDs for PCsGet Rid of the Focused Inbox for OutlookAttackers Shifting Away from Using Microsoft Office Macros2 weeks ago Read more -
Blog postIt’s a good security practice to name your Wi-Fi network with something that does not give a clue as to
The post Can You Name Your Wi-Fi Networks Using Emojis? appeared first on Sensei Enterprises, Inc..
Related StoriesPrinters Are Network Access Devices TooAttackers Shifting Away from Using Microsoft Office MacrosRansomware Resource: No More Ransom2 weeks ago Read more -
Blog postEC-Council runs the Certified Ethical Hacker (CEH) program, which is one of the more popular and “sexy” cybersecurity certifications on
The post Certified Ethical Hacker Company Not So Ethical appeared first on Sensei Enterprises, Inc..
Related StoriesAttackers Shifting Away from Using Microsoft Office MacrosRansomware Resource: No More RansomCan You Name Your Wi-Fi Networks Using Emojis?3 weeks ago Read more -
Blog postThe demise of passwords has been touted as the future of authentication. I’ve heard that story for many years and
The post Enforcing Password History Can Curb Reuse appeared first on Sensei Enterprises, Inc..
Related StoriesAttackers Shifting Away from Using Microsoft Office MacrosRansomware Resource: No More RansomRecent Windows Update May Break USB Printing3 weeks ago Read more -
Blog postMicrosoft’s Word is one of the core products in the Office suite. Pretty much every user has used the word
The post Cheat Sheet Available for Word for Microsoft 365 appeared first on Sensei Enterprises, Inc..
Related StoriesGet Rid of the Focused Inbox for OutlookUber Receipts Can Kill Microsoft OutlookNew Version of Winamp Available for Download3 weeks ago Read more
Titles By John W. Simek
The popular annual guide to legal technology is back with its 2020 edition. The Solo and Small Firm Legal Technology Guide is the only book of its kind to help solo and small firm lawyers find the best value for their dollars in legal tech. In clear, understandable language, it gives a vendor-neutral overview of and recommendations for computers, servers, networking equipment, legal software, printers, security products, smartphones, tablets, and more. Whether you choose to do it yourself or work with an IT consultant, this book has the information you need to reduce the sea of choices to a manageable set of proven options. New and updated topics for this edition include:
•The latest recommendations on hardware and software for PCs, Macs, and tablets
•Best products and practices to protect sensitive data from internal and external security threats
•Tips for safe and secure remote access to your data, even when traveling abroad
•Advice to help you prepare for the worst-case scenarios - lost smartphone, data breach, natural disaster...
•Tomorrow in legal tech, from trends in cyber risks to cloud computing and artificial intelligence