Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

How Does This Happen?

An employee had access to data that they weren’t authorized to have. According to Trend Micro, they were able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

This employee, who remains unnamed, apparently had planned to steal data, and ended up being able to bypass the internal protections Trend Micro had in place.

Since the data had more than enough information for a scammer to use to trick a user into believing they were calling from Trend Micro (all it really takes is a name and phone number, and knowing that they use the product), this kind of data has a great deal of value to scammers. It gives them an easy way in to steal money from unsuspecting people under the guise of Trend Micro tech support.

Be Wary of Any Unsolicited Tech Support Calls

This isn’t a new problem, and it definitely isn’t only a problem for Trend Micro customers. Fake tech support scammers have been around for years, often preying on older, less-technically-savvy users. They use scare tactics and feign urgency to get their victim to hand over credit card information or allow remote access to the PC. 

More often than not, these calls will come in saying they are “Microsoft Windows Support” or some general computer support. If the scammer thinks they are targeting an individual at a business, they might say they are from the IT department.

It’s important to be wary and educate your employees so they know the proper channels for getting support requests handled. 

The Other Lesson - Don’t Let Employees Access Data They Don’t Need

As a business owner, you need to ask yourself who has a little too much access. Can all employees wander into folders on your network that contain personal or financial information? 

An employee should only have access to the data that they need, although it’s also important to not make it too difficult for an employee to do their job. Establishing the policies for this can be tricky but setting up the permissions on your network just takes a little work with your IT provider.

Enforcing security policies, like controlling who has access to what data, requiring strong passwords, and setting up multi-factor authentication can go a long way in protecting your business and its customers from a rogue employee running off with data. An ounce of prevention is worth a ton of damage control, in this case.

Need help? Our IT experts can work with you to lock down your data. Give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Outsourced IT Ransomware Data Backup Windows 10 Save Money Cloud Computing Office Data Recovery Server Windows 10 Passwords Chrome Social Media Tech Term Virtualization Gadgets Saving Money Holiday Microsoft Office Managed Service Automation Managed IT Services Operating System Facebook Computers Cybercrime Artificial Intelligence Hacking Internet of Things Health BYOD Mobile Device Management Wi-Fi Networking IT Support Managed Service Provider Covid-19 Information Telephone Systems Information Technology Alert Remote Spam Office 365 Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Encryption Big Data Applications App History Law Enforcement Mobile Computing Human Resources Data Breach Application Password Remote Monitoring Money How To Office Tips Training Government Data Storage Patch Management VPN Private Cloud Remote Computing Managed IT Mobile Office Apps Blockchain Paperless Office Google Drive Wireless Infrastructure Voice over Internet Protocol Avoiding Downtime Gmail Flexibility Vulnerability Marketing Settings WiFi Windows 7 Word IT solutions Entertainment Two-factor Authentication Website Budget Servers Bring Your Own Device Data Management Mouse Work/Life Balance HaaS Data Security Physical Security Education Machine Learning Risk Management Safety Connectivity Remote Work Hacker HIPAA Sports Employee/Employer Relationship Redundancy Keyboard RMM The Internet of Things Lithium-ion battery Conferencing Scam Firewall Data Protection Save Time Virtual Reality USB Apple Vendor Management Social Cleaning User Error Vendor Meetings Managed Services End of Support Software as a Service Display Telephone System Staff Robot Excel Value Processor Internet Exlporer Update Biometrics Spam Blocking Virtual Desktop Electronic Medical Records PDF Hard Drive Google Docs Hiring/Firing Identity Theft DDoS Virus Proactive IT SharePoint Computing Best Practice Unified Threat Management Computer Accessories YouTube Augmented Reality Black Market Customer Service Fraud Business Intelligence Environment Digital Signage Remote Worker Audit Fax Server Worker Document Management Printer IT Management Cryptocurrency Solid State Drive Wireless Technology Bluetooth How to Downtime SaaS Botnet IT Plan Procurement Data storage Comparison Net Neutrality Workplace Strategy Automobile Unsupported Software Network Congestion CES Help Desk IT Consultant eWaste Printing Computing Infrastructure Charger Business Technology Content Management Going Green Access Control Compliance Humor OneNote Computer Care Managed Services Provider Virtual Assistant Current Events Authentication Database Telephony Battery Wearable Technology Retail Samsung Shadow IT Hard Drives Legal Remote Workers Instant Messaging Nanotechnology IT Assessment Telecommuting Manufacturing Skype Project Management Email Best Practices Running Cable Politics Data loss Advertising Cortana Memory Best Available WIndows 7 Troubleshooting Security Cameras Outlook Computer Tips Leadership Digital Signature Managed IT Service OneDrive Biometric Security Notifications Start Menu Warranty Virtual CIO Screen Mirroring HVAC Peripheral Loyalty Google Apps Books Frequently Asked Questions Digital Security Cameras Analysis Using Data Windows 10s Devices Copiers Relocation 5G Science Mobile Administrator Cast Enterprise Content Management Quick Tip User Emergency Smartwatch PowerPoint Windows Media Player Tip of the week MSP Ergonomics Video Games webinar Accountants Public Cloud Thought Leadership Development Customer Relationship Management Employer Employee Relationship Credit Cards OLED Professional Services Microchip Worker Commute Distributed Denial of Service Experience Password Management PCI DSS Assessment Password Manager Virtual Machine Analyitcs Managing Stress Multi-Factor Security Employee Windows Server 2008 2FA Scalability Fiber Optics Programming Twitter Messaging Cabling Tools Search Engine Business Owner Cameras NIST Policy Television Business Mangement Hypervisor NarrowBand Trending Dark mode Search Antivirus Smart Tech Trend Micro Addiction SMS iPhone Amazon Default App Windows 8 Procedure IT service Public Computer Recycling Saving Time Transportation Google Search Regulations Wiring dark theme Practices Shopping Computer Fan Cache AI Files Rootkit Amazon Web Services IT Infrastructure Tablet Printer Server Safe Mode FinTech Domains Criminal Chromecast Bing Benefits GDPR Workers Hosted Computing Social Network IaaS FENG Wireless Internet Colocation Maintenance Online Shopping Investment Uninterrupted Power Supply File Sharing Employees IBM Employee/Employer Relationships Bloatware Monitor Smart Technology Specifications ISP Flash Camera Windows 365 Inventory Wire Video Conferencing Evernote ROI Tablets Software Tips Sales Supercomputer Bitcoin Entrepreneur Travel Shortcuts Emails Personal Reputation Millennials Cryptomining Streaming Media Sync Printers Point of Sale Content Smart Office Supply Chain Management Shortcut Wireless Charging Tech Support Monitoring Techology Batteries Laptop Cost Management Netflix Digitize Customers Social Networking Two Factor Authentication Workforce Virtual Private Network Windows 8.1 Audiobook Root Cause Analysis Cables Windows Server 2008 R2 Consultant Music Analytics HBO Customer relationships Knowledge Touchpad

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code