Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

Continue reading
0 Comments

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Communication IT Support Smartphones Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Upgrade Managed IT Services Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Office Server Save Money Data Recovery Windows 10 Passwords Saving Money Holiday Tech Term Gadgets Social Media Chrome Virtualization Managed IT Services Automation Microsoft Office Managed Service Facebook Artificial Intelligence Cybercrime Operating System Computers BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Health Hacking Telephone Systems Information Technology Alert Managed Service Provider Remote Spam Covid-19 Information Office 365 BDR Bandwidth Employer-Employee Relationship Recovery Social Engineering Mobility Router App Law Enforcement History Application Data Breach Human Resources Password Big Data Money Encryption Remote Monitoring Applications Mobile Computing Office Tips Training Data Storage Private Cloud Patch Management VPN Managed IT Apps Remote Computing Blockchain Mobile Office Paperless Office How To Government Avoiding Downtime Website Budget Infrastructure Voice over Internet Protocol Wireless Vulnerability Gmail Windows 7 Word Settings Bring Your Own Device Data Management Work/Life Balance Servers Two-factor Authentication Mouse Data Security HaaS Flexibility Google Drive Marketing WiFi IT solutions Entertainment Risk Management Hacker RMM USB The Internet of Things Conferencing Lithium-ion battery Save Time Scam Data Protection Firewall Cleaning Vendor Management Virtual Reality Apple End of Support Social Education Physical Security Vendor Managed Services Safety User Error Telephone System Staff Software as a Service Display Meetings HIPAA Sports Machine Learning Redundancy Remote Work Keyboard Connectivity Employee/Employer Relationship YouTube Hiring/Firing Identity Theft Biometrics Virtual Desktop Black Market Computing DDoS Document Management IT Consultant Augmented Reality Wireless Technology Fraud SharePoint Solid State Drive How to Business Intelligence Downtime Remote Worker Humor Digital Signage Worker Audit Customer Service IT Management Cryptocurrency Data storage Automobile Environment Botnet Fax Server IT Plan Procurement Comparison Net Neutrality Workplace Strategy Computing Infrastructure Going Green Unsupported Software CES Help Desk SaaS Printing Charger Battery Business Technology Content Management Compliance Network Congestion Access Control Shadow IT OneNote Virus Computer Care Managed Services Provider eWaste Legal Virtual Assistant Current Events Database Telephony Authentication Internet Exlporer Unified Threat Management Computer Accessories Samsung Remote Workers PDF Value Processor Wearable Technology Retail Hard Drives Update Proactive IT Electronic Medical Records Instant Messaging Spam Blocking Excel Printer Hard Drive Robot Bluetooth Best Practice Google Docs 5G Experience Mobile Administrator Windows 10s Devices Copiers Scalability Cast Enterprise Content Management Quick Tip Printer Server Business Owner Tip of the week MSP Ergonomics webinar Accountants Emergency Smartwatch NarrowBand Employer Employee Relationship Credit Cards OLED Professional Services Microchip Public Cloud Thought Leadership Development Search Password Management PCI DSS Science Assessment Password Manager Virtual Machine Windows Server 2008 2FA iPhone Fiber Optics Multi-Factor Security Employee Cabling Tools Search Engine Twitter Messaging Customer Relationship Management NIST Policy Television Business Mangement Hypervisor Distributed Denial of Service Dark mode Analyitcs Files Smart Tech Trend Micro Trending Chromecast Amazon Default App Programming Addiction SMS Procedure Public Computer Recycling Saving Time Regulations Wiring dark theme Colocation Practices Shopping Uninterrupted Power Supply Transportation Google Search Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Antivirus Consultant Safe Mode FinTech Windows 8 Monitor Analytics Criminal Bing Benefits IT service GDPR Workers Hosted Computing Social Network FENG Wireless Internet Online Shopping Investment Best Available WIndows 7 File Sharing Employees Tablet Reputation IBM Employee/Employer Relationships Streaming Media Smart Technology Specifications ISP Domains Content Flash Camera Windows 365 Inventory Tech Support Wire Video Conferencing Laptop Evernote ROI Techology Maintenance Software Tips Sales Customers Supercomputer Bitcoin Travel Shortcuts IaaS Millennials Cryptomining Audiobook Sync Printers Point of Sale Bloatware Emails Personal Smart Office Supply Chain Management Touchpad Wireless Charging User Monitoring Tablets PowerPoint Batteries Windows Media Player Two Factor Authentication Workforce Politics Virtual Private Network Windows 8.1 Entrepreneur Advertising Netflix Digitize Root Cause Analysis Cables Windows Server 2008 R2 Shortcut Managing Stress HBO Customer relationships Knowledge Notifications Music Telecommuting Manufacturing Skype Project Management Email Best Practices Cost Management Nanotechnology IT Assessment Data loss Cameras Cortana Social Networking Outlook Computer Tips Relocation Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Biometric Security Start Menu Warranty Virtual CIO OneDrive Video Games Screen Mirroring HVAC Peripheral Loyalty Google Apps Running Cable Worker Commute Frequently Asked Questions Digital Security Cameras Memory Analysis Using Data Books

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code