Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

How Does This Happen?

An employee had access to data that they weren’t authorized to have. According to Trend Micro, they were able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

This employee, who remains unnamed, apparently had planned to steal data, and ended up being able to bypass the internal protections Trend Micro had in place.

Since the data had more than enough information for a scammer to use to trick a user into believing they were calling from Trend Micro (all it really takes is a name and phone number, and knowing that they use the product), this kind of data has a great deal of value to scammers. It gives them an easy way in to steal money from unsuspecting people under the guise of Trend Micro tech support.

Be Wary of Any Unsolicited Tech Support Calls

This isn’t a new problem, and it definitely isn’t only a problem for Trend Micro customers. Fake tech support scammers have been around for years, often preying on older, less-technically-savvy users. They use scare tactics and feign urgency to get their victim to hand over credit card information or allow remote access to the PC. 

More often than not, these calls will come in saying they are “Microsoft Windows Support” or some general computer support. If the scammer thinks they are targeting an individual at a business, they might say they are from the IT department.

It’s important to be wary and educate your employees so they know the proper channels for getting support requests handled. 

The Other Lesson - Don’t Let Employees Access Data They Don’t Need

As a business owner, you need to ask yourself who has a little too much access. Can all employees wander into folders on your network that contain personal or financial information? 

An employee should only have access to the data that they need, although it’s also important to not make it too difficult for an employee to do their job. Establishing the policies for this can be tricky but setting up the permissions on your network just takes a little work with your IT provider.

Enforcing security policies, like controlling who has access to what data, requiring strong passwords, and setting up multi-factor authentication can go a long way in protecting your business and its customers from a rogue employee running off with data. An ounce of prevention is worth a ton of damage control, in this case.

Need help? Our IT experts can work with you to lock down your data. Give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android Disaster Recovery VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Virtualization Saving Money Holiday Gadgets Tech Term Social Media Chrome Managed IT Services Managed Service Automation Microsoft Office Cybercrime Computers Artificial Intelligence Facebook Operating System Health BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Remote Spam Covid-19 Office 365 Information Alert Telephone Systems Managed Service Provider Information Technology Router BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Encryption Human Resources Applications Data Breach Mobile Computing Remote Monitoring Application Law Enforcement App History Big Data Password Money Remote Computing Government Mobile Office Blockchain Paperless Office Private Cloud How To Managed IT Office Tips Training Apps VPN Data Storage Patch Management Windows 7 Flexibility Word Two-factor Authentication Marketing Google Drive WiFi Servers IT solutions Entertainment Mouse HaaS Website Budget Avoiding Downtime Data Security Wireless Infrastructure Bring Your Own Device Voice over Internet Protocol Data Management Work/Life Balance Gmail Settings Vulnerability Education Physical Security Scam Safety Virtual Reality Sports HIPAA Apple Redundancy Vendor Management Social Keyboard Vendor USB User Error Managed Services Meetings Software as a Service Display Telephone System Staff Machine Learning Connectivity Remote Work Save Time Risk Management Employee/Employer Relationship Hacker RMM The Internet of Things Lithium-ion battery Cleaning Conferencing End of Support Firewall Data Protection Computer Accessories Internet Exlporer Worker Audit Procurement IT Management SaaS Comparison Net Neutrality Workplace Strategy Help Desk Botnet PDF CES IT Plan Printing Network Congestion Printer Proactive IT Business Technology Bluetooth eWaste Content Management Unsupported Software Access Control Managed Services Provider Best Practice YouTube Charger Virtual Assistant Authentication Black Market Database Compliance Computer Care IT Consultant OneNote Wearable Technology Remote Workers Current Events Retail Hard Drives Document Management Telephony Processor Instant Messaging Humor Wireless Technology Samsung Robot Update Excel Solid State Drive How to Downtime Hard Drive Biometrics Value Virtual Desktop Google Docs Data storage Identity Theft Automobile Spam Blocking Electronic Medical Records Computing DDoS Computing Infrastructure SharePoint Hiring/Firing Going Green Augmented Reality Fraud Customer Service Digital Signage Remote Worker Battery Virus Environment Cryptocurrency Shadow IT Legal Business Intelligence Fax Server Unified Threat Management Cache AI IT service Amazon Web Services IT Infrastructure Bing Politics Safe Mode FinTech Managing Stress Advertising Criminal Hosted Computing Social Network Public Computer Tablet GDPR Regulations Wireless Internet Domains Online Shopping Investment Cameras Notifications Transportation Rootkit File Sharing Employees Computer Fan Employee/Employer Relationships IaaS Inventory Maintenance Specifications ISP Camera Windows 365 Wire Video Conferencing Relocation Workers Evernote ROI Benefits Bloatware Travel Shortcuts Sales FENG Bitcoin Video Games Personal IBM Millennials Cryptomining Tablets Printers Point of Sale Worker Commute Flash Smart Office Supply Chain Management Wireless Charging Printer Server Smart Technology Entrepreneur Experience Monitoring Batteries Scalability Software Tips Digitize Supercomputer Shortcut Workforce Virtual Private Network Windows 8.1 Business Owner Sync Emails Cables Windows Server 2008 R2 Cost Management NarrowBand Social Networking Customer relationships Search Nanotechnology IT Assessment Telecommuting Manufacturing Project Management Email Best Practices iPhone Netflix Cortana Two Factor Authentication Security Cameras Computer Tips Root Cause Analysis Running Cable Digital Signature Managed IT Service HBO OneDrive Knowledge Biometric Security Music Memory Warranty Virtual CIO Skype HVAC Peripheral Files Google Apps Chromecast Digital Security Cameras Data loss Analysis Using Data Administrator Outlook Devices Copiers Consultant Leadership 5G Troubleshooting Start Menu Enterprise Content Management Quick Tip Colocation Analytics Uninterrupted Power Supply Accountants Loyalty Smartwatch Science MSP Ergonomics Screen Mirroring Microchip Frequently Asked Questions Thought Leadership Development Best Available Monitor Credit Cards OLED Books Mobile Password Management PCI DSS WIndows 7 Windows 10s Password Manager Virtual Machine Fiber Optics Customer Relationship Management Multi-Factor Security Employee 2FA Cast Distributed Denial of Service Search Engine Tip of the week Twitter Messaging Reputation webinar Cabling Streaming Media Emergency Analyitcs Content Professional Services NIST Policy Public Cloud Business Mangement Hypervisor Tech Support Employer Employee Relationship Programming Smart Tech Trend Micro Laptop Assessment Trending Dark mode Techology Windows Server 2008 Addiction SMS Customers Amazon Default App Windows Media Player Audiobook Tools Procedure User Antivirus Recycling Saving Time PowerPoint Practices Shopping Touchpad Television Google Search Windows 8 Wiring dark theme

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code