Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

Continue reading
0 Comments

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Outsourced IT Data Backup Ransomware Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Chrome Social Media Virtualization Gadgets Tech Term Saving Money Holiday Automation Microsoft Office Managed IT Services Managed Service Operating System Facebook Cybercrime Computers Artificial Intelligence Hacking Internet of Things Health BYOD Wi-Fi Mobile Device Management Networking IT Support Information Technology Covid-19 Information Alert Spam Remote Office 365 Telephone Systems Managed Service Provider Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Big Data Law Enforcement Human Resources Mobile Computing Application Remote Monitoring Password Money Encryption App Data Breach History Applications Training Blockchain VPN Government Paperless Office Private Cloud How To Remote Computing Managed IT Mobile Office Apps Data Storage Patch Management Office Tips Servers Gmail Avoiding Downtime Settings Flexibility Data Security Marketing WiFi Two-factor Authentication IT solutions Infrastructure Entertainment Voice over Internet Protocol Website Budget Mouse Bring Your Own Device HaaS Data Management Work/Life Balance Vulnerability Windows 7 Word Wireless Google Drive Sports Managed Services HIPAA Display The Internet of Things Redundancy Vendor Management Lithium-ion battery Keyboard Employee/Employer Relationship Telephone System Staff Software as a Service Machine Learning Firewall RMM Remote Work Connectivity Virtual Reality Apple Save Time Social USB Cleaning User Error Meetings Conferencing Data Protection End of Support Scam Risk Management Education Physical Security Hacker Vendor Safety PDF DDoS Business Technology Content Management Remote Workers SharePoint Access Control Unsupported Software Proactive IT Processor Virtual Assistant Charger Best Practice Virus Authentication YouTube Hard Drive Compliance Customer Service Unified Threat Management Environment Black Market OneNote Computer Care Current Events Computer Accessories Telephony Fax Server Update Computing Samsung Document Management Solid State Drive Wireless Technology SaaS How to Downtime Google Docs Value Identity Theft Printer Bluetooth Spam Blocking Electronic Medical Records Network Congestion Digital Signage Data storage eWaste Automobile Hiring/Firing Augmented Reality Computing Infrastructure Fraud IT Consultant Going Green Procurement Net Neutrality Remote Worker Workplace Strategy Wearable Technology Retail Help Desk Cryptocurrency Hard Drives Humor Printing Instant Messaging Battery Business Intelligence Excel Shadow IT Robot Legal Audit Worker Biometrics IT Management Comparison Internet Exlporer Managed Services Provider Virtual Desktop Botnet CES Database IT Plan Science Evernote WIndows 7 Workers Windows Server 2008 R2 Benefits Wire Customer relationships FENG Travel IT Assessment IBM Manufacturing Printers Relocation Email Best Practices Millennials Flash Wireless Charging Distributed Denial of Service Smart Technology Customer Relationship Management Smart Office Security Cameras Analyitcs Video Games Computer Tips Managed IT Service OneDrive Supercomputer Biometric Security Virtual Private Network Programming Worker Commute Virtual CIO Software Tips Workforce Sync Cables User Peripheral Emails PowerPoint Windows Media Player Experience Scalability Digital Security Cameras Using Data Telecommuting Copiers Antivirus 5G Project Management Business Owner Nanotechnology Windows 8 Cortana Managing Stress NarrowBand Quick Tip Netflix Two Factor Authentication IT service Smartwatch Search Digital Signature Ergonomics Root Cause Analysis Development Knowledge Cameras OLED Music Warranty iPhone HBO HVAC Tablet Skype Google Apps PCI DSS Virtual Machine Domains Employee Analysis 2FA Data loss Fiber Optics Messaging Leadership Cabling Troubleshooting Administrator Devices Files Outlook Enterprise Content Management Start Menu Chromecast Policy IaaS Hypervisor Maintenance MSP Bloatware Accountants Dark mode Screen Mirroring Trend Micro Loyalty Colocation Frequently Asked Questions Credit Cards Uninterrupted Power Supply SMS Printer Server Default App Books Microchip Thought Leadership Password Management Tablets Mobile Password Manager Procedure Windows 10s Saving Time Shopping Google Search Entrepreneur Monitor dark theme Cast Multi-Factor Security Tip of the week AI webinar IT Infrastructure Emergency Search Engine Twitter Bing NIST Professional Services Business Mangement FinTech Public Cloud Employer Employee Relationship Shortcut Streaming Media Social Network Assessment Cost Management Smart Tech Reputation Trending Windows Server 2008 Amazon Tech Support Investment Social Networking Content Addiction Techology Tools Recycling Laptop Employees Employee/Employer Relationships Television ISP Wiring Practices Customers Windows 365 Amazon Web Services Video Conferencing Running Cable ROI Audiobook Cache Shortcuts Safe Mode Memory Criminal Touchpad Sales Bitcoin Personal Public Computer Cryptomining GDPR Hosted Computing Point of Sale Consultant Advertising Regulations Online Shopping Supply Chain Management Analytics Transportation Politics Wireless Internet File Sharing Monitoring Computer Fan Batteries Rootkit Notifications Digitize Camera Inventory Windows 8.1 Specifications Best Available

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code