Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

How Does This Happen?

An employee had access to data that they weren’t authorized to have. According to Trend Micro, they were able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

This employee, who remains unnamed, apparently had planned to steal data, and ended up being able to bypass the internal protections Trend Micro had in place.

Since the data had more than enough information for a scammer to use to trick a user into believing they were calling from Trend Micro (all it really takes is a name and phone number, and knowing that they use the product), this kind of data has a great deal of value to scammers. It gives them an easy way in to steal money from unsuspecting people under the guise of Trend Micro tech support.

Be Wary of Any Unsolicited Tech Support Calls

This isn’t a new problem, and it definitely isn’t only a problem for Trend Micro customers. Fake tech support scammers have been around for years, often preying on older, less-technically-savvy users. They use scare tactics and feign urgency to get their victim to hand over credit card information or allow remote access to the PC. 

More often than not, these calls will come in saying they are “Microsoft Windows Support” or some general computer support. If the scammer thinks they are targeting an individual at a business, they might say they are from the IT department.

It’s important to be wary and educate your employees so they know the proper channels for getting support requests handled. 

The Other Lesson - Don’t Let Employees Access Data They Don’t Need

As a business owner, you need to ask yourself who has a little too much access. Can all employees wander into folders on your network that contain personal or financial information? 

An employee should only have access to the data that they need, although it’s also important to not make it too difficult for an employee to do their job. Establishing the policies for this can be tricky but setting up the permissions on your network just takes a little work with your IT provider.

Enforcing security policies, like controlling who has access to what data, requiring strong passwords, and setting up multi-factor authentication can go a long way in protecting your business and its customers from a rogue employee running off with data. An ounce of prevention is worth a ton of damage control, in this case.

Need help? Our IT experts can work with you to lock down your data. Give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Chrome Gadgets Virtualization Social Media Tech Term Saving Money Holiday Microsoft Office Managed IT Services Managed Service Automation Operating System Artificial Intelligence Computers Facebook Cybercrime IT Support Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking Remote Managed Service Provider Spam Office 365 Alert Covid-19 Telephone Systems Information Information Technology Router Social Engineering Mobility BDR Employer-Employee Relationship Recovery Bandwidth Data Breach Big Data Remote Monitoring Law Enforcement App History Mobile Computing Password Money Application Encryption Human Resources Applications Remote Computing Mobile Office Government Blockchain Private Cloud Paperless Office How To Managed IT Office Tips Training Apps VPN Data Storage Patch Management Servers Mouse HaaS Avoiding Downtime Data Security Flexibility Marketing Wireless Bring Your Own Device WiFi Data Management Work/Life Balance IT solutions Infrastructure Entertainment Website Gmail Voice over Internet Protocol Budget Settings Vulnerability Windows 7 Word Two-factor Authentication Google Drive Sports HIPAA Apple Redundancy Social Vendor Management Keyboard User Error Meetings Vendor Managed Services Telephone System Staff Software as a Service Display Save Time Risk Management Machine Learning Hacker Remote Work Connectivity The Internet of Things Employee/Employer Relationship Cleaning Lithium-ion battery RMM USB Conferencing End of Support Firewall Education Physical Security Scam Safety Virtual Reality Data Protection Botnet PDF IT Plan Procurement Workplace Strategy Network Congestion Comparison Net Neutrality Proactive IT eWaste Unsupported Software CES Help Desk Printing Best Practice YouTube Charger Business Technology Black Market Content Management Access Control Compliance Computer Care Managed Services Provider Wearable Technology OneNote Virtual Assistant Retail Current Events Hard Drives Document Management Telephony Authentication Virus Instant Messaging Database Solid State Drive Robot Wireless Technology Samsung Excel How to Downtime Remote Workers Unified Threat Management Computer Accessories Biometrics Virtual Desktop Value Processor Data storage Update Electronic Medical Records Automobile Spam Blocking Hard Drive DDoS Google Docs Hiring/Firing Identity Theft SharePoint Computing Infrastructure Printer Going Green Bluetooth Computing Customer Service Battery Augmented Reality Environment Shadow IT Fraud Legal Business Intelligence Fax Server IT Consultant Remote Worker Digital Signage Internet Exlporer Worker Audit IT Management Cryptocurrency Humor SaaS Rootkit Amazon Web Services IT Infrastructure Computer Fan Cache AI IaaS Safe Mode FinTech Maintenance Criminal Bing GDPR Consultant Relocation Workers Hosted Computing Social Network Bloatware Benefits Online Shopping Investment FENG Wireless Internet Analytics Video Games File Sharing Employees IBM Employee/Employer Relationships Tablets Worker Commute Flash Camera Windows 365 Best Available Inventory Entrepreneur Smart Technology Specifications ISP Evernote ROI Experience WIndows 7 Wire Video Conferencing Scalability Software Tips Sales Shortcut Supercomputer Bitcoin Travel Shortcuts Business Owner Sync Printers Point of Sale Emails Personal Cost Management Millennials Cryptomining Social Networking NarrowBand Wireless Charging Smart Office Supply Chain Management Search Monitoring Batteries Virtual Private Network Windows 8.1 iPhone Netflix Digitize Two Factor Authentication Workforce Root Cause Analysis PowerPoint Cables Windows Server 2008 R2 Windows Media Player User Running Cable HBO Customer relationships Knowledge Memory Music Telecommuting Manufacturing Skype Project Management Email Best Practices Files Nanotechnology IT Assessment Data loss Chromecast Cortana Managing Stress Outlook Computer Tips Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Uninterrupted Power Supply Biometric Security Start Menu Warranty Virtual CIO Colocation OneDrive Cameras Screen Mirroring HVAC Peripheral Loyalty Google Apps Science Frequently Asked Questions Digital Security Cameras Monitor Analysis Using Data Books 5G Mobile Administrator Windows 10s Devices Copiers Cast Enterprise Content Management Quick Tip Customer Relationship Management Distributed Denial of Service Tip of the week MSP Ergonomics Reputation webinar Accountants Analyitcs Streaming Media Emergency Smartwatch Tech Support Employer Employee Relationship Credit Cards OLED Content Professional Services Microchip Public Cloud Thought Leadership Development Printer Server Programming Techology Password Management PCI DSS Laptop Assessment Password Manager Virtual Machine Windows Server 2008 2FA Customers Fiber Optics Multi-Factor Security Employee Cabling Audiobook Tools Search Engine Antivirus Twitter Messaging NIST Policy Touchpad Television Business Mangement Hypervisor Windows 8 Dark mode IT service Smart Tech Trend Micro Trending Amazon Default App Politics Advertising Addiction SMS Procedure Public Computer Recycling Saving Time Tablet Regulations Wiring dark theme Domains Practices Shopping Notifications Transportation Google Search

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code