Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

How Does This Happen?

An employee had access to data that they weren’t authorized to have. According to Trend Micro, they were able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

This employee, who remains unnamed, apparently had planned to steal data, and ended up being able to bypass the internal protections Trend Micro had in place.

Since the data had more than enough information for a scammer to use to trick a user into believing they were calling from Trend Micro (all it really takes is a name and phone number, and knowing that they use the product), this kind of data has a great deal of value to scammers. It gives them an easy way in to steal money from unsuspecting people under the guise of Trend Micro tech support.

Be Wary of Any Unsolicited Tech Support Calls

This isn’t a new problem, and it definitely isn’t only a problem for Trend Micro customers. Fake tech support scammers have been around for years, often preying on older, less-technically-savvy users. They use scare tactics and feign urgency to get their victim to hand over credit card information or allow remote access to the PC. 

More often than not, these calls will come in saying they are “Microsoft Windows Support” or some general computer support. If the scammer thinks they are targeting an individual at a business, they might say they are from the IT department.

It’s important to be wary and educate your employees so they know the proper channels for getting support requests handled. 

The Other Lesson - Don’t Let Employees Access Data They Don’t Need

As a business owner, you need to ask yourself who has a little too much access. Can all employees wander into folders on your network that contain personal or financial information? 

An employee should only have access to the data that they need, although it’s also important to not make it too difficult for an employee to do their job. Establishing the policies for this can be tricky but setting up the permissions on your network just takes a little work with your IT provider.

Enforcing security policies, like controlling who has access to what data, requiring strong passwords, and setting up multi-factor authentication can go a long way in protecting your business and its customers from a rogue employee running off with data. An ounce of prevention is worth a ton of damage control, in this case.

Need help? Our IT experts can work with you to lock down your data. Give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Windows Managed IT Services Phishing Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Server Save Money Data Recovery Office Windows 10 Passwords Tech Term Chrome Gadgets Virtualization Saving Money Social Media Holiday Managed IT Services Microsoft Office Automation Managed Service Cybercrime Operating System Computers Artificial Intelligence Facebook IT Support Health Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Networking Managed Service Provider Spam Alert Office 365 Remote Telephone Systems Information Information Technology Covid-19 Router Social Engineering Mobility BDR Bandwidth Employer-Employee Relationship Recovery Human Resources Big Data Law Enforcement Remote Monitoring Data Breach Mobile Computing App Password History Money Application Encryption Applications Data Storage Remote Computing Government Patch Management Mobile Office Private Cloud Managed IT Blockchain Office Tips Paperless Office Training Apps How To VPN Two-factor Authentication Avoiding Downtime Vulnerability Mouse HaaS Windows 7 Word Flexibility Servers Marketing WiFi Bring Your Own Device Data Management IT solutions Work/Life Balance Entertainment Wireless Website Data Security Budget Gmail Infrastructure Settings Voice over Internet Protocol Google Drive HIPAA Sports Redundancy Employee/Employer Relationship Keyboard RMM Virtual Reality Apple Conferencing Social Data Protection Scam User Error Meetings Save Time Vendor Management Risk Management Hacker Cleaning Telephone System Staff Software as a Service Machine Learning The Internet of Things Lithium-ion battery USB Vendor Remote Work Connectivity End of Support Managed Services Display Education Physical Security Safety Firewall PDF Hard Drive Hiring/Firing Augmented Reality Fraud SaaS Proactive IT Remote Worker Computing Best Practice Cryptocurrency Network Congestion YouTube Business Intelligence eWaste Black Market Audit Worker IT Management Digital Signage Comparison Virus Document Management Botnet Solid State Drive CES Wireless Technology Unified Threat Management How to IT Plan Wearable Technology Downtime Retail Computer Accessories Hard Drives Business Technology Procurement Content Management Instant Messaging Robot Excel Workplace Strategy Access Control Unsupported Software Data storage Net Neutrality Automobile Virtual Assistant Help Desk Charger Biometrics Virtual Desktop Printing Authentication Computing Infrastructure Compliance Printer OneNote Bluetooth Going Green Computer Care Current Events DDoS Telephony Managed Services Provider SharePoint Update Samsung Battery Database Shadow IT Legal Remote Workers IT Consultant Google Docs Value Identity Theft Customer Service Processor Spam Blocking Internet Exlporer Electronic Medical Records Environment Humor Fax Server Peripheral Password Management Mobile Password Manager Windows 10s IT service Digital Security Cameras Using Data Cast Multi-Factor Security Relocation 5G webinar Consultant Emergency Tablet Search Engine Copiers Twitter Tip of the week Quick Tip NIST Professional Services Business Mangement Public Cloud Domains Employer Employee Relationship Analytics Ergonomics Video Games Smart Tech Smartwatch Trending Assessment IaaS OLED Amazon Best Available Maintenance Worker Commute Development Addiction Windows Server 2008 Experience PCI DSS Tools Virtual Machine Recycling WIndows 7 Bloatware 2FA Wiring Scalability Fiber Optics Practices Employee Television Cabling Amazon Web Services Tablets Business Owner Messaging Cache Policy Safe Mode Hypervisor Criminal NarrowBand Entrepreneur Dark mode GDPR Search Trend Micro Hosted Computing Public Computer iPhone Default App Online Shopping Shortcut Transportation SMS Wireless Internet Regulations Windows Media Player Procedure File Sharing Saving Time Computer Fan User Rootkit PowerPoint Cost Management Social Networking dark theme Camera Shopping Inventory Google Search Specifications Files IT Infrastructure Evernote Workers Benefits AI Wire FinTech FENG Managing Stress Chromecast Bing Travel Printers Social Network Running Cable Millennials IBM Flash Colocation Investment Wireless Charging Uninterrupted Power Supply Smart Technology Cameras Memory Smart Office Employees Employee/Employer Relationships Supercomputer Windows 365 Virtual Private Network Software Tips Monitor ISP Workforce Sync ROI Cables Emails Video Conferencing Sales Bitcoin Shortcuts Streaming Media Science Point of Sale Project Management Personal Nanotechnology Reputation Cryptomining Telecommuting Cortana Netflix Tech Support Two Factor Authentication Printer Server Content Supply Chain Management Monitoring Techology Batteries Digital Signature Root Cause Analysis Laptop Knowledge Customer Relationship Management Music Windows 8.1 Warranty Digitize HBO Distributed Denial of Service Customers HVAC Skype Windows Server 2008 R2 Google Apps Analyitcs Audiobook Customer relationships Analysis Data loss Touchpad Programming Leadership Troubleshooting Email Best Practices Administrator IT Assessment Devices Outlook Manufacturing Enterprise Content Management Start Menu Advertising Politics Computer Tips MSP Managed IT Service Accountants Screen Mirroring Antivirus Security Cameras Loyalty Credit Cards Notifications Books Windows 8 Virtual CIO Microchip OneDrive Thought Leadership Frequently Asked Questions Biometric Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code