Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

Continue reading
0 Comments

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware VoIP Disaster Recovery Android communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Upgrade Phishing Windows Ransomware Data Backup Outsourced IT Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Chrome Virtualization Tech Term Gadgets Social Media Saving Money Holiday Managed Service Managed IT Services Automation Microsoft Office Computers Facebook Artificial Intelligence Cybercrime Operating System Internet of Things BYOD Wi-Fi Mobile Device Management Health Networking IT Support Hacking Remote Information Office 365 Telephone Systems Covid-19 Information Technology Alert Managed Service Provider Spam Router BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility Law Enforcement Data Breach App Mobile Computing History Application Password Human Resources Money Encryption Big Data Applications Remote Monitoring Government Office Tips Private Cloud Training Managed IT VPN Apps How To Remote Computing Blockchain Mobile Office Paperless Office Data Storage Patch Management Vulnerability Windows 7 Word Flexibility Avoiding Downtime Marketing Infrastructure Servers Voice over Internet Protocol WiFi Wireless IT solutions Entertainment Website Budget Gmail Data Security Bring Your Own Device Data Management Settings Work/Life Balance Two-factor Authentication Mouse HaaS Google Drive Meetings Keyboard Machine Learning Scam Connectivity Remote Work Risk Management Hacker Vendor Vendor Management Managed Services Display The Internet of Things Save Time Lithium-ion battery USB Data Protection Employee/Employer Relationship Cleaning Firewall RMM Virtual Reality Apple End of Support Education Physical Security Social Safety User Error HIPAA Sports Redundancy Software as a Service Conferencing Telephone System Staff Workplace Strategy Net Neutrality Wearable Technology Virus Business Intelligence Proactive IT Update Retail Help Desk Hard Drives Instant Messaging Audit Best Practice Printing Worker Unified Threat Management Computer Accessories Robot Excel IT Management YouTube Black Market Google Docs Biometrics Botnet Identity Theft Managed Services Provider Virtual Desktop IT Plan Database Document Management DDoS Printer Solid State Drive Unsupported Software Wireless Technology Downtime Bluetooth Remote Workers Augmented Reality How to Fraud Charger SharePoint Processor Data storage Compliance Remote Worker Automobile OneNote Computer Care Current Events Hard Drive Customer Service Cryptocurrency Environment Telephony IT Consultant Computing Infrastructure Samsung Going Green Fax Server Comparison Computing Humor Value SaaS CES Battery Spam Blocking Electronic Medical Records Shadow IT Business Technology Legal Content Management Access Control Hiring/Firing Network Congestion Digital Signage eWaste Internet Exlporer Virtual Assistant Authentication PDF Procurement Cost Management Nanotechnology Tools Relocation Telecommuting Social Network Project Management Television Investment Social Networking Cortana Employees User Employee/Employer Relationships PowerPoint Windows Media Player Video Games Digital Signature Worker Commute Windows 365 ISP Warranty Video Conferencing Public Computer Running Cable ROI Experience HVAC Google Apps Regulations Sales Managing Stress Bitcoin Transportation Shortcuts Memory Scalability Analysis Cryptomining Administrator Business Owner Devices Point of Sale Computer Fan Personal Rootkit Supply Chain Management Cameras Enterprise Content Management NarrowBand Accountants Monitoring Workers Batteries Benefits MSP Search Microchip Thought Leadership iPhone Credit Cards Windows 8.1 FENG Digitize IBM Windows Server 2008 R2 Password Management Science Password Manager Flash Multi-Factor Security Customer relationships Smart Technology Manufacturing Search Engine Twitter Files Email Best Practices IT Assessment Supercomputer Distributed Denial of Service Printer Server Customer Relationship Management NIST Business Mangement Software Tips Chromecast Smart Tech Sync Trending Computer Tips Emails Managed IT Service Security Cameras Analyitcs Biometric Security Programming Addiction Colocation Amazon Virtual CIO Uninterrupted Power Supply OneDrive Peripheral Recycling Practices Monitor Digital Security Cameras Netflix Using Data Two Factor Authentication Wiring Antivirus 5G Cache Amazon Web Services Root Cause Analysis Copiers Quick Tip Knowledge Music Safe Mode Windows 8 Criminal HBO Hosted Computing Skype Reputation Ergonomics Streaming Media IT service Smartwatch GDPR OLED Content Wireless Internet Online Shopping Data loss Tech Support Development Laptop PCI DSS Leadership Virtual Machine Troubleshooting File Sharing Tablet Techology Outlook Inventory Start Menu Customers Specifications 2FA Fiber Optics Domains Employee Camera Cabling Audiobook Wire Evernote Screen Mirroring Messaging Consultant Loyalty Touchpad Travel Policy IaaS Hypervisor Analytics Books Maintenance Frequently Asked Questions Bloatware Mobile Millennials Dark mode Windows 10s Trend Micro Printers Default App Politics Smart Office Advertising Wireless Charging Cast SMS Best Available Procedure WIndows 7 webinar Saving Time Emergency Tablets Tip of the week Entrepreneur Professional Services Workforce dark theme Public Cloud Notifications Shopping Employer Employee Relationship Google Search Virtual Private Network IT Infrastructure Cables AI Assessment Windows Server 2008 FinTech Shortcut Bing

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code