Contact us today!

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

Continue reading

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Google Network Security Business Software Internet Email Microsoft Workplace Tips Backup Malware Data Innovation User Tips Hardware Mobile Devices Disaster Recovery Android VoIP Computer IT Services Smartphones Business Continuity Communication Smartphone IT Support Mobile Device Miscellaneous communications Small Business Network Collaboration Browser Productivity Business Management Quick Tips Users Upgrade Phishing Cybersecurity Outsourced IT Data Backup Windows 10 Windows Managed IT Services Server Save Money Data Recovery Cloud Computing Passwords Ransomware Windows 10 Office Tech Term Social Media Chrome Gadgets Holiday Microsoft Office Virtualization Managed IT Services Managed Service Saving Money Automation Cybercrime Computers Facebook IT Support Operating System Health Hacking Internet of Things BYOD Artificial Intelligence Networking Information Technology Wi-Fi Managed Service Provider Spam Covid-19 Office 365 Information Telephone Systems Alert Mobile Device Management Recovery Employer-Employee Relationship Social Engineering Mobility Remote Router BDR Bandwidth Password Money Big Data Applications Data Breach Remote Monitoring Mobile Computing Law Enforcement Application App History VPN Apps Data Storage Patch Management Human Resources Encryption Remote Computing Mobile Office Blockchain Government Paperless Office Private Cloud Office Tips How To Managed IT Training Data Management Work/Life Balance Gmail Settings Two-factor Authentication Windows 7 Google Drive Word Mouse Flexibility HaaS Marketing Avoiding Downtime WiFi IT solutions Entertainment Website Budget Data Security Wireless Infrastructure Bring Your Own Device Cleaning Data Protection Firewall End of Support Conferencing Physical Security Vulnerability Education Virtual Reality Apple Scam Safety HIPAA Sports Social Redundancy Keyboard Servers User Error Vendor Management Managed Services Meetings Staff Software as a Service Telephone System Machine Learning Vendor Connectivity Remote Work USB Display Hacker Save Time Voice over Internet Protocol The Internet of Things Lithium-ion battery Employee/Employer Relationship Spam Blocking Electronic Medical Records Computing Augmented Reality Computing Infrastructure Fraud RMM Going Green Hiring/Firing Customer Service Remote Worker Environment Cryptocurrency Battery Fax Server Shadow IT Legal Digital Signage Comparison SaaS Internet Exlporer Business Intelligence CES Virus Audit Worker Network Congestion PDF IT Management Unified Threat Management eWaste Procurement Business Technology Content Management Net Neutrality Access Control Botnet Computer Accessories Printing Proactive IT IT Plan Virtual Assistant Help Desk Authentication Best Practice YouTube Unsupported Software Wearable Technology Black Market Retail Hard Drives Printer Charger Bluetooth Managed Services Provider Instant Messaging Excel Update Compliance Remote Workers Robot Database OneNote Computer Care Document Management Current Events Risk Management Solid State Drive Biometrics Wireless Technology Telephony Google Docs Virtual Desktop Downtime Identity Theft Samsung IT Consultant Processor DDoS Data storage Automobile Value SharePoint Hard Drive Humor Monitor Start Menu Multi-Factor Security 2FA Distributed Denial of Service Customer Relationship Management Development Search Engine 5G Analyitcs Twitter Screen Mirroring Loyalty Frequently Asked Questions Policy Books Programming NIST Business Mangement Reputation Consultant Smartwatch Smart Tech Mobile Streaming Media Trending Windows 10s Dark mode Fiber Optics Content Messaging OLED Addiction Tech Support Analytics Amazon Cast Tip of the week webinar Procedure Antivirus Emergency Techology Virtual Machine Laptop Recycling Customers Best Available Employee Windows 8 Practices Professional Services Public Cloud dark theme Employer Employee Relationship Trend Micro Wiring Assessment Audiobook SMS IT service WIndows 7 Cabling Cache Amazon Web Services Windows Server 2008 FinTech Hypervisor Safe Mode Touchpad Criminal Tablet Hosted Computing Tools Shopping GDPR Television Politics AI Domains Advertising Default App Wireless Internet Online Shopping Employees Saving Time File Sharing Google Search Inventory Notifications Specifications IaaS Social Network Maintenance Camera Public Computer User IT Infrastructure Bloatware Wire PowerPoint Evernote Windows Media Player Regulations Travel Sales Transportation Bing Printers Relocation Tablets Millennials Computer Fan Rootkit Supply Chain Management Managing Stress Investment Entrepreneur Smart Office Wireless Charging Workers Monitoring Benefits Video Games Bitcoin Personal Shortcut Virtual Private Network ISP Cameras Workforce FENG Worker Commute IBM Experience ROI Cost Management Cables Shortcuts Flash Customer relationships Smart Technology Scalability Batteries Social Networking Digitize Project Management Cryptomining Nanotechnology Telecommuting Business Owner Supercomputer NarrowBand Cortana Software Tips Digital Signature Sync Emails Computer Tips Running Cable Search IT Assessment Warranty iPhone Memory Printer Server Peripheral Windows Server 2008 R2 HVAC Google Apps Analysis Netflix Digital Security Cameras Two Factor Authentication How to Managed IT Service OneDrive Administrator Files Manufacturing Devices Root Cause Analysis Knowledge Quick Tip Music Enterprise Content Management Chromecast HBO Security Cameras Science Accountants Skype Ergonomics Using Data MSP Copiers Microchip Colocation Biometric Security Thought Leadership Uninterrupted Power Supply Credit Cards Data loss Leadership PCI DSS Troubleshooting Password Management Password Manager Outlook

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...