If your security stack has grown organically over time, gaps are almost inevitable. Tools get added, settings get tweaked, and over time, consistency slips. These security gaps are often where attackers find their foothold. The good news? Most of these weaknesses...
jbartolomeo@onlinecomputers.com
Stop Ransomware in its Tracks: A 5-Step Proactive Defense Plan
Ransomware isn’t a jump scare. It’s a slow build. In many cases, it begins days, or even weeks, before encryption, with something mundane, like a login that never should have succeeded. That’s why an effective ransomware defense plan is about more than deploying...
Phishing: A Security Threat Most Businesses Can’t Get Around
Due to its simplicity and high rates of success, phishing attempts have become pervasive amongst low-level criminals and high-tech hackers alike. Overall, experts estimate that phishing and ransomware attacks generate over $1 billion annually from direct ransom...
Are Reused Passwords Getting You in Trouble?
Using the same password across multiple accounts makes life easier...but it makes breaches far worse. Once threat actors breach one account, they will often try the same login credentials on other platforms too. If you reused that breached password anywhere, then...
The Right IT Provider Is Crucial for Your Success
In the digital era that we live in, we cannot overemphasize the significance of an IT provider for the different aspects of your business. It is impossible to start or operate a business without relying partly on IT services and support. It is a challenge to stay...
How AI Makes Phishing More Dangerous
Phishing scams remain one of the most common and successful forms of cyberattacks. Now, with the rise of artificial intelligence (AI), these scams have become even more convincing and harder to detect. Why do threat actors love to phish? It's highly effective. All it...
Your Employees are on the Front Line of Cyber Defense.
Untrained employees are often the weakest link in your company’s defense against cybercriminals. Online Computers can help turn them into your strongest line of protection. Cyber-Attacks are on the Rise Employees are often trusting, which makes them a common target...
Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect
How many text messages (smishing scams) from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging consumers to sign...
Fixing Your Weakest Link: Your Employees
You can have every piece of security hardware in the books: firewall, backup disaster recovery device, and even anti-virus. However, your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as...
The Human Element: How an MSP Protects Your Company
If you missed what a Managed Service Provider is, check it out first. Then take a deeper look into how an MSP protects your company. Now, let’s get into how partnering with an MSP protects you from the human element. Everyday Criminals Sometimes, crime revolves around...
Are Your Texts Secure?
Text messages have become one of the fastest and most familiar ways to communicate. For many of us, sending a quick text seems faster and easier than logging into a secure system or placing an encrypted call. It’s just one message, right? That’s all it takes to...
iPhone Running Slow? Speed It up with One of These Tips
Let's face it, iPhones are amazing devices. But even the sleekest, most powerful iPhone can succumb to the dreaded slowdown. Apps take forever to load and scrolling feels sluggish. Pretty soon, simple tasks become frustrating ordeals. If your iPhone has gone from...












