094 90 48200    Get SUPPORT

Aniar IT Services Blog

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

How Does This Happen?

An employee had access to data that they weren’t authorized to have. According to Trend Micro, they were able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

This employee, who remains unnamed, apparently had planned to steal data, and ended up being able to bypass the internal protections Trend Micro had in place.

Since the data had more than enough information for a scammer to use to trick a user into believing they were calling from Trend Micro (all it really takes is a name and phone number, and knowing that they use the product), this kind of data has a great deal of value to scammers. It gives them an easy way in to steal money from unsuspecting people under the guise of Trend Micro tech support.

Be Wary of Any Unsolicited Tech Support Calls

This isn’t a new problem, and it definitely isn’t only a problem for Trend Micro customers. Fake tech support scammers have been around for years, often preying on older, less-technically-savvy users. They use scare tactics and feign urgency to get their victim to hand over credit card information or allow remote access to the PC. 

More often than not, these calls will come in saying they are “Microsoft Windows Support” or some general computer support. If the scammer thinks they are targeting an individual at a business, they might say they are from the IT department.

It’s important to be wary and educate your employees so they know the proper channels for getting support requests handled. 

The Other Lesson - Don’t Let Employees Access Data They Don’t Need

As a business owner, you need to ask yourself who has a little too much access. Can all employees wander into folders on your network that contain personal or financial information? 

An employee should only have access to the data that they need, although it’s also important to not make it too difficult for an employee to do their job. Establishing the policies for this can be tricky but setting up the permissions on your network just takes a little work with your IT provider.

Enforcing security policies, like controlling who has access to what data, requiring strong passwords, and setting up multi-factor authentication can go a long way in protecting your business and its customers from a rogue employee running off with data. An ounce of prevention is worth a ton of damage control, in this case.

Need help? Our IT experts can work with you to lock down your data. Give us a call at 094 90 48200.

Is VoIP Really More Cost Effective?
Know Your Tech: Fiber Optics
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 08 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Productivity Best Practices Cloud Privacy Network Security Hosted Solutions Email Innovation User Tips Workplace Tips Internet Efficiency Data IT Support Google Microsoft Hardware Software Hackers Business Data Backup Communication Small Business Managed IT Services Data Recovery Smartphones VoIP Cybersecurity Computer Tech Term Cloud Computing Mobile Devices Malware Communications Collaboration IT Services Windows 10 Phishing Mobile Device Gadgets Android Backup Smartphone Outsourced IT Business Continuity Network Users Artificial Intelligence Browser Saving Money Windows Information Disaster Recovery Business Management Managed Service Facebook Miscellaneous Internet of Things Spam BDR Server Upgrade Social Media Chrome How To Quick Tips Passwords Automation Office 365 Router Computers Data Security Applications Data Storage Windows 7 Blockchain Apps Microsoft Office BYOD Paperless Office Holiday Word Cybercrime Mobile Office Connectivity Settings Money Virtualization Display Mobile Device Management Managed IT Encryption Wi-Fi Human Resources Two-factor Authentication Infrastructure History Networking Staff Bandwidth Vulnerability Government Data Breach Remote Work Operating System Data Protection Patch Management HIPAA Save Money Ransomware Telephone System Remote Monitoring OneNote Help Desk Google Docs Sports Machine Learning Access Control Compliance Digital Signage Law Enforcement Unsupported Software Cryptocurrency Telephony Employee/Employer Relationship CES Training Fraud Software as a Service Scam Update Business Intelligence Keyboard Content Management Botnet Augmented Reality VPN Spam Blocking Processor Password Bring Your Own Device Virtual Assistant Managed IT services Business Technology Redundancy Voice over Internet Protocol Vendor Management IT Management App Telephone Systems Hard Drive Meetings Health Social Engineering Avoiding Downtime Big Data Office Google Drive Website Education Managed Services Provider Identity Theft Servers Audit Comparison IT Plan Vendor Procurement Private Cloud Value Workforce OLED Using Data Credit Cards PDF HVAC Flash SMS Gmail Cast File Sharing ISP Batteries PCI DSS Data Management Printer Tip of the week Remote Computing IT Assessment Workers Specifications Wireless Public Cloud Mobile Computing Default App Shopping Evernote Cleaning Trending Managed Services Cryptomining Biometric Security Information Technology HaaS Virtual Machine AI Recycling Devices Virtual Private Network Computer Fan YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive Authentication Data loss Google Search Software Tips Policy Smart Office HBO IT Infrastructure Social Network Practices Safe Mode Security Cameras Covid-19 Cache Remote Worker Database Telecommuting Manufacturing Computing Amazon Shortcuts Hypervisor Remote eWaste Thought Leadership 5G Remote Workers FENG Microchip Computer Care Copiers Cortana Alert Save Time Wireless Internet Procedure Document Management Camera Outlook Investment Printing Charger Hosted Computing Smartwatch Skype Peripheral Wiring Travel The Internet of Things Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Hacker Going Green Legal Managed IT Service Search Engine Development Password Manager Nanotechnology Proactive IT Tools Work/Life Balance USB Solid State Drive FinTech Printers Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Start Menu Project Management Quick Tip Firewall Cabling Fiber Optics Downtime Password Management Social Sync Multi-Factor Security Saving Time Criminal Twitter Windows 10s Millennials Digital Signature Bing WiFi Messaging Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Bitcoin Regulations Electronic Medical Records Wire Physical Security Apple Entertainment Warranty Excel GDPR Digitize Google Apps Employer-Employee Relationship Employee Unified Threat Management Cables Trend Micro Online Shopping Root Cause Analysis NIST Supply Chain Management Addiction Domains Financial Windows 10 Hard Drives Public Speaking Search Regulation Presentation Lithium-ion battery CrashOverride Wireless Technology Company Culture Tech Support Emergency IBM Safety Productivity Managed Service Provider Marketing Managing Stress Budget Customer Relationship Management Hiring/Firing Competition IP Address Fun Personal Information Customer Service