Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

Continue reading
0 Comments

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Productivity Hosted Solutions Hackers Google Efficiency Network Security Business Microsoft Internet Backup Workplace Tips Software Email Data Innovation Malware User Tips Hardware VoIP Android Computer Disaster Recovery Mobile Devices IT Services Smartphones Smartphone Business Continuity Mobile Device IT Support Miscellaneous Communication communications Small Business Network Collaboration Browser Productivity Quick Tips Users Upgrade Business Management Outsourced IT Windows 10 Windows Phishing Managed IT Services Data Backup Server Save Money Data Recovery Cybersecurity Cloud Computing Windows 10 Office Chrome Tech Term Social Media Holiday Gadgets Passwords Microsoft Office Managed Service Virtualization Automation Saving Money Cybercrime Computers Facebook Managed IT Services Health IT Support Artificial Intelligence Operating System Hacking Ransomware BYOD Internet of Things Alert Networking Wi-Fi Managed Service Provider Covid-19 Spam Information Office 365 Telephone Systems Information Technology Social Engineering Mobility Router BDR Mobile Device Management Recovery Employer-Employee Relationship Bandwidth Big Data Money Remote Monitoring Applications App Mobile Computing History Data Breach Law Enforcement Application Human Resources How To Managed IT Remote Computing Password Apps Paperless Office Mobile Office Blockchain Patch Management Encryption Office Tips Government VPN Private Cloud Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Mouse HaaS Data Storage Flexibility Windows 7 Google Drive Word Marketing WiFi Wireless Infrastructure IT solutions Training Entertainment Avoiding Downtime Website Budget Gmail Settings Data Security Remote Virtual Reality Apple Managed Services Cleaning Vendor Telephone System User Error Meetings End of Support Display Machine Learning Staff Software as a Service Conferencing Vulnerability Connectivity Education Physical Security Scam Safety Remote Work Sports HIPAA Redundancy Hacker Keyboard Voice over Internet Protocol Servers The Internet of Things Vendor Management Lithium-ion battery USB Firewall Data Protection Save Time Printing Net Neutrality SaaS Comparison Data storage Help Desk Value Automobile Business Technology CES Spam Blocking Electronic Medical Records Access Control Computing Infrastructure Network Congestion Virtual Assistant eWaste Content Management Social Going Green Managed Services Provider Hiring/Firing Remote Workers Battery Shadow IT Virus Wearable Technology Legal Hard Drives Processor Retail Unified Threat Management Instant Messaging Internet Exlporer Business Intelligence Computer Accessories Robot Update Excel Hard Drive Audit Worker Risk Management PDF Biometrics IT Management Employee/Employer Relationship Virtual Desktop Google Docs Identity Theft Botnet Proactive IT IT Plan Augmented Reality Printer DDoS Best Practice Bluetooth SharePoint YouTube Unsupported Software Remote Worker Black Market Charger Fraud Digital Signage Cryptocurrency Compliance Customer Service Environment OneNote IT Consultant Computer Care Document Management Solid State Drive Wireless Technology Fax Server Downtime Telephony Procurement Samsung Humor Criminal Chromecast HBO Knowledge File Sharing Music Camera Inventory Supply Chain Management Skype Tablet Investment Colocation Bitcoin Uninterrupted Power Supply Data loss Wire Domains Online Shopping Customer relationships Troubleshooting Personal Outlook ISP Leadership Consultant Printers Analytics IaaS Maintenance Specifications Monitor Start Menu ROI Evernote Computer Tips Bloatware Batteries Screen Mirroring Shortcuts Loyalty Smart Office Books Travel Digitize Frequently Asked Questions Cryptomining Best Available Streaming Media Windows 10s WIndows 7 Virtual Private Network Authentication Millennials Reputation Mobile Tablets Wireless Charging Digital Security Cameras Entrepreneur Tech Support Cast Content Emergency Techology IT Assessment Laptop Tip of the week Database webinar Windows Server 2008 R2 Public Cloud Project Management Employer Employee Relationship Nanotechnology Shortcut Workforce Peripheral Customers Professional Services Cables Ergonomics Cost Management Managed IT Service Assessment Audiobook Social Networking OneDrive Touchpad Windows Server 2008 Manufacturing User Warranty PowerPoint Windows Media Player Telecommuting Quick Tip Tools Cortana Advertising Using Data Security Cameras Television HVAC Politics Running Cable Digital Signature Copiers Biometric Security Memory Notifications Managing Stress Administrator Devices PCI DSS Google Apps Computing Public Computer Enterprise Content Management MSP Transportation Cameras Accountants Development Regulations 5G RMM Computer Fan Microchip Rootkit Thought Leadership Policy Relocation Fiber Optics Smartwatch Password Management Benefits Video Games Messaging Science OLED Workers Virtual Machine FENG Search Engine Twitter Worker Commute Credit Cards Procedure Password Manager Trend Micro Employee IBM NIST Experience Smart Technology Printer Server Distributed Denial of Service Smart Tech Scalability Customer Relationship Management Multi-Factor Security SMS Flash Cabling Analyitcs Hypervisor Bing Addiction Business Owner FinTech Business Mangement Programming Shopping NarrowBand Software Tips Supercomputer Wiring Practices Search Trending AI Sync Default App Emails Saving Time Cache Amazon Employees iPhone Antivirus Recycling Social Network Google Search Current Events Safe Mode GDPR Two Factor Authentication Hosted Computing How to Windows 8 IT Infrastructure Netflix Root Cause Analysis Wireless Internet IT service Amazon Web Services Sales Files

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code