Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

Continue reading
0 Comments

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Phishing Windows Managed IT Services Upgrade Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Virtualization Gadgets Saving Money Holiday Tech Term Chrome Social Media Managed IT Services Managed Service Microsoft Office Automation Computers Cybercrime Artificial Intelligence Operating System Facebook Internet of Things Health BYOD Wi-Fi Mobile Device Management Networking IT Support Hacking Alert Spam Information Office 365 Remote Managed Service Provider Telephone Systems Information Technology Covid-19 Recovery BDR Employer-Employee Relationship Bandwidth Social Engineering Mobility Router Law Enforcement Mobile Computing Human Resources Application Remote Monitoring Password Money Data Breach Encryption Big Data App Applications History Private Cloud Remote Computing Managed IT Data Storage Patch Management Blockchain Mobile Office Paperless Office Apps Office Tips Training VPN Government How To Marketing WiFi Two-factor Authentication IT solutions Entertainment Website Budget Mouse Bring Your Own Device Vulnerability HaaS Data Management Work/Life Balance Windows 7 Word Servers Infrastructure Voice over Internet Protocol Wireless Google Drive Data Security Gmail Flexibility Avoiding Downtime Settings Employee/Employer Relationship Firewall RMM Virtual Reality Save Time Apple USB Conferencing Social Scam User Error Cleaning Software as a Service Telephone System Staff Meetings Machine Learning Connectivity Remote Work End of Support Vendor Management Education Risk Management Physical Security Hacker Safety HIPAA Vendor Sports Redundancy The Internet of Things Managed Services Lithium-ion battery Keyboard Display Data Protection Hard Drive Spam Blocking Electronic Medical Records Fax Server Comparison Document Management Printer Wireless Technology Computing Hiring/Firing SaaS Solid State Drive CES Bluetooth How to Downtime Business Technology Content Management Access Control Network Congestion Data storage Automobile eWaste Virtual Assistant Digital Signage IT Consultant Authentication Business Intelligence Computing Infrastructure Going Green Audit Worker Humor IT Management Procurement Wearable Technology Retail Botnet Update Workplace Strategy Hard Drives Net Neutrality Battery Instant Messaging IT Plan Excel Help Desk Robot Shadow IT Google Docs Printing Legal Identity Theft Biometrics Unsupported Software Virtual Desktop Internet Exlporer Charger Managed Services Provider Compliance DDoS PDF OneNote Computer Care Augmented Reality Database SharePoint Fraud Current Events Telephony Remote Workers Virus Proactive IT Samsung Remote Worker Processor Unified Threat Management Best Practice YouTube Cryptocurrency Customer Service Computer Accessories Black Market Environment Value Leadership Troubleshooting Business Owner Cache Antivirus Amazon Web Services Outlook Peripheral Cameras NarrowBand Start Menu Digital Security Cameras Windows 8 Using Data Safe Mode Criminal Search Hosted Computing IT service Screen Mirroring Copiers Loyalty GDPR 5G Books Wireless Internet iPhone Online Shopping Frequently Asked Questions Quick Tip Mobile Ergonomics Tablet Windows 10s File Sharing Smartwatch Inventory Domains Specifications Cast Development Camera OLED webinar Virtual Machine Emergency Wire Files Evernote Tip of the week PCI DSS Maintenance Printer Server Chromecast Professional Services Travel 2FA Public Cloud Fiber Optics Employer Employee Relationship Employee IaaS Millennials Bloatware Messaging Assessment Printers Cabling Hypervisor Smart Office Colocation Wireless Charging Uninterrupted Power Supply Windows Server 2008 Policy Tools Dark mode Tablets Trend Micro Monitor Workforce Entrepreneur SMS Television Virtual Private Network Default App Saving Time Cables Procedure Shortcut dark theme Shopping Google Search Nanotechnology Reputation Telecommuting Cost Management Streaming Media AI Public Computer Project Management IT Infrastructure FinTech Transportation Content Bing Cortana Social Networking Tech Support Regulations Laptop Computer Fan Social Network Rootkit Techology Digital Signature Investment Customers Warranty Employees Workers Employee/Employer Relationships Benefits Audiobook HVAC Running Cable Consultant Google Apps Analytics Touchpad Windows 365 Memory FENG ISP Analysis Administrator ROI Devices Video Conferencing IBM Sales Bitcoin Smart Technology Politics Enterprise Content Management Shortcuts Best Available Advertising Flash Accountants Point of Sale Personal MSP Cryptomining WIndows 7 Microchip Thought Leadership Credit Cards Notifications Software Tips Supply Chain Management Supercomputer Monitoring Science Emails Batteries Password Management Password Manager Sync Multi-Factor Security Windows 8.1 Digitize Search Engine Windows Server 2008 R2 Twitter Relocation Customer relationships Netflix Two Factor Authentication NIST Distributed Denial of Service Business Mangement Customer Relationship Management Video Games Smart Tech PowerPoint Trending Email Best Practices Analyitcs Windows Media Player Root Cause Analysis IT Assessment Manufacturing User Knowledge Music Worker Commute Addiction Amazon Programming HBO Skype Computer Tips Managed IT Service Experience Security Cameras Recycling Managing Stress Scalability Practices Virtual CIO Data loss OneDrive Wiring Biometric Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code