Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

How Does This Happen?

An employee had access to data that they weren’t authorized to have. According to Trend Micro, they were able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

This employee, who remains unnamed, apparently had planned to steal data, and ended up being able to bypass the internal protections Trend Micro had in place.

Since the data had more than enough information for a scammer to use to trick a user into believing they were calling from Trend Micro (all it really takes is a name and phone number, and knowing that they use the product), this kind of data has a great deal of value to scammers. It gives them an easy way in to steal money from unsuspecting people under the guise of Trend Micro tech support.

Be Wary of Any Unsolicited Tech Support Calls

This isn’t a new problem, and it definitely isn’t only a problem for Trend Micro customers. Fake tech support scammers have been around for years, often preying on older, less-technically-savvy users. They use scare tactics and feign urgency to get their victim to hand over credit card information or allow remote access to the PC. 

More often than not, these calls will come in saying they are “Microsoft Windows Support” or some general computer support. If the scammer thinks they are targeting an individual at a business, they might say they are from the IT department.

It’s important to be wary and educate your employees so they know the proper channels for getting support requests handled. 

The Other Lesson - Don’t Let Employees Access Data They Don’t Need

As a business owner, you need to ask yourself who has a little too much access. Can all employees wander into folders on your network that contain personal or financial information? 

An employee should only have access to the data that they need, although it’s also important to not make it too difficult for an employee to do their job. Establishing the policies for this can be tricky but setting up the permissions on your network just takes a little work with your IT provider.

Enforcing security policies, like controlling who has access to what data, requiring strong passwords, and setting up multi-factor authentication can go a long way in protecting your business and its customers from a rogue employee running off with data. An ounce of prevention is worth a ton of damage control, in this case.

Need help? Our IT experts can work with you to lock down your data. Give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Ransomware Data Backup Outsourced IT Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Virtualization Gadgets Social Media Saving Money Holiday Tech Term Microsoft Office Managed IT Services Automation Managed Service Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking IT Support Spam Remote Office 365 Telephone Systems Alert Information Technology Covid-19 Information Managed Service Provider Social Engineering Mobility BDR Employer-Employee Relationship Recovery Bandwidth Router Remote Monitoring Big Data Law Enforcement Data Breach App History Mobile Computing Password Application Money Human Resources Encryption Applications Data Storage Government Patch Management Private Cloud Office Tips Training Managed IT Blockchain VPN Paperless Office Apps How To Remote Computing Mobile Office Vulnerability Avoiding Downtime Windows 7 Word Flexibility Marketing Servers Wireless WiFi IT solutions Bring Your Own Device Entertainment Data Management Website Gmail Work/Life Balance Budget Data Security Settings Two-factor Authentication Google Drive Infrastructure Voice over Internet Protocol Mouse HaaS User Error Conferencing Meetings Scam Data Protection Risk Management Hacker Save Time Vendor Management Vendor The Internet of Things Lithium-ion battery Managed Services Display Cleaning USB Staff Software as a Service Telephone System Employee/Employer Relationship Machine Learning Firewall End of Support Connectivity Remote Work RMM Education Physical Security Virtual Reality Apple Safety HIPAA Sports Social Redundancy Keyboard Fraud Best Practice Remote Worker YouTube Business Intelligence Wearable Technology Black Market Procurement Retail Net Neutrality Hard Drives Cryptocurrency Workplace Strategy Audit Worker Virus Instant Messaging Robot Help Desk Excel IT Management Printing Unified Threat Management Document Management Botnet Solid State Drive Computer Accessories Comparison Wireless Technology Biometrics Virtual Desktop IT Plan How to Downtime CES Managed Services Provider Unsupported Software DDoS Data storage Content Management Database Business Technology Automobile Access Control Charger Printer SharePoint Bluetooth Remote Workers Computing Infrastructure Compliance Virtual Assistant OneNote Authentication Computer Care Going Green Processor Customer Service Current Events Environment Telephony Samsung Hard Drive Fax Server IT Consultant Battery Update Shadow IT Legal Value Computing Humor SaaS Spam Blocking Electronic Medical Records Google Docs Internet Exlporer Identity Theft PDF Hiring/Firing Network Congestion eWaste Digital Signage Augmented Reality Proactive IT Search Engine WIndows 7 Twitter Video Games Procedure Assessment Saving Time Business Mangement Shopping Shortcut Google Search Windows Server 2008 NIST Worker Commute dark theme Experience Smart Tech AI Trending IT Infrastructure Cost Management Tools Social Networking Bing Addiction Scalability FinTech Television Amazon Recycling Social Network Business Owner Wiring Practices NarrowBand Investment Windows Media Player User Cache Search Employees Public Computer PowerPoint Amazon Web Services Running Cable Employee/Employer Relationships Criminal iPhone Transportation ISP Memory Regulations Safe Mode Windows 365 GDPR Computer Fan Hosted Computing Video Conferencing Rootkit ROI Shortcuts Managing Stress Wireless Internet Sales Online Shopping Bitcoin Workers Files Personal Benefits Cryptomining File Sharing Point of Sale Camera FENG Inventory Supply Chain Management Cameras Specifications Chromecast Science Wire Monitoring IBM Evernote Batteries Colocation Digitize Smart Technology Travel Uninterrupted Power Supply Flash Windows 8.1 Printers Millennials Windows Server 2008 R2 Customer Relationship Management Software Tips Smart Office Customer relationships Supercomputer Wireless Charging Distributed Denial of Service Monitor Emails IT Assessment Manufacturing Analyitcs Sync Email Best Practices Virtual Private Network Printer Server Workforce Programming Streaming Media Security Cameras Computer Tips Cables Reputation Managed IT Service Virtual CIO Netflix OneDrive Two Factor Authentication Tech Support Biometric Security Content Project Management Root Cause Analysis Nanotechnology Techology Peripheral Telecommuting Antivirus Laptop Using Data Music Windows 8 HBO Digital Security Cameras Knowledge Cortana Customers Digital Signature Copiers IT service 5G Skype Audiobook Warranty Data loss Quick Tip Touchpad Troubleshooting Smartwatch Tablet Outlook HVAC Ergonomics Leadership Google Apps Politics Analysis Advertising Development Domains OLED Start Menu Administrator Screen Mirroring Devices PCI DSS Loyalty Virtual Machine IaaS Fiber Optics Books Maintenance Notifications Employee Frequently Asked Questions Enterprise Content Management 2FA Windows 10s Consultant Accountants Messaging Cabling Bloatware Mobile MSP Microchip Cast Thought Leadership Policy Analytics Credit Cards Hypervisor Relocation Trend Micro Emergency Tablets Tip of the week Password Management Dark mode webinar Password Manager Public Cloud Best Available SMS Employer Employee Relationship Multi-Factor Security Default App Entrepreneur Professional Services

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code