094 90 48200     Get SUPPORT

Aniar IT Services Blog

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Former Trend Micro Employee Sold 68,000 Customer Records to Scammers

Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get.

How Does This Happen?

An employee had access to data that they weren’t authorized to have. According to Trend Micro, they were able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

This employee, who remains unnamed, apparently had planned to steal data, and ended up being able to bypass the internal protections Trend Micro had in place.

Since the data had more than enough information for a scammer to use to trick a user into believing they were calling from Trend Micro (all it really takes is a name and phone number, and knowing that they use the product), this kind of data has a great deal of value to scammers. It gives them an easy way in to steal money from unsuspecting people under the guise of Trend Micro tech support.

Be Wary of Any Unsolicited Tech Support Calls

This isn’t a new problem, and it definitely isn’t only a problem for Trend Micro customers. Fake tech support scammers have been around for years, often preying on older, less-technically-savvy users. They use scare tactics and feign urgency to get their victim to hand over credit card information or allow remote access to the PC. 

More often than not, these calls will come in saying they are “Microsoft Windows Support” or some general computer support. If the scammer thinks they are targeting an individual at a business, they might say they are from the IT department.

It’s important to be wary and educate your employees so they know the proper channels for getting support requests handled. 

The Other Lesson - Don’t Let Employees Access Data They Don’t Need

As a business owner, you need to ask yourself who has a little too much access. Can all employees wander into folders on your network that contain personal or financial information? 

An employee should only have access to the data that they need, although it’s also important to not make it too difficult for an employee to do their job. Establishing the policies for this can be tricky but setting up the permissions on your network just takes a little work with your IT provider.

Enforcing security policies, like controlling who has access to what data, requiring strong passwords, and setting up multi-factor authentication can go a long way in protecting your business and its customers from a rogue employee running off with data. An ounce of prevention is worth a ton of damage control, in this case.

Need help? Our IT experts can work with you to lock down your data. Give us a call at 094 90 48200 .

Is VoIP Really More Cost Effective?
Know Your Tech: Fiber Optics


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 19 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Productivity Cloud User Tips Email Innovation Workplace Tips Hosted Solutions Microsoft Internet Network Security Hackers Google Data Data Backup Tech Term Hardware Data Recovery Software Smartphones Efficiency Communication IT Support IT Services Managed IT Services Communications Windows 10 Business Mobile Devices Cloud Computing Cybersecurity Malware VoIP Computer Android Small Business Gadgets Users Backup Mobile Device Collaboration Artificial Intelligence Smartphone Saving Money Phishing Network Internet of Things Business Management Outsourced IT Facebook Browser Miscellaneous Upgrade Server Spam Windows Information Business Continuity Office 365 Chrome How To Social Media Router BDR Managed Service Paperless Office Windows 7 Computers Holiday Word Cybercrime Passwords Applications BYOD Staff Save Money Remote Monitoring Blockchain Settings Data Protection Patch Management Data Security Telephone System Data Storage Ransomware Display Mobile Device Management Two-factor Authentication Connectivity Quick Tips Money Vulnerability History Operating System Encryption Data Breach Apps Infrastructure Microsoft Office Password Bandwidth Disaster Recovery Government Private Cloud IT Plan Big Data Managed IT services Education Website Servers Redundancy Voice over Internet Protocol OneNote Automation Virtualization Telephone Systems Unsupported Software Vendor Social Engineering Avoiding Downtime Help Desk Identity Theft Machine Learning Digital Signage Cryptocurrency Comparison Training Spam Blocking Software as a Service Wi-Fi Google Docs Sports Bring Your Own Device Access Control Law Enforcement IT Management Augmented Reality Networking Telephony CES Managed IT Fraud Scam App Processor Meetings Human Resources Update Virtual Assistant Business Intelligence Google Drive Keyboard Content Management Botnet VPN Employer-Employee Relationship Project Management Computer Care Audit ROI Physical Security Personal Health Firewall Outlook Cabling Fiber Optics Charger Hosted Computing Password Management Social Skype Root Cause Analysis Saving Time Wireless Internet MSP Net Neutrality Travel Remote Work Cast Managed Services Provider Amazon Web Services Accountants Bing Legal Bitcoin Entertainment Warranty GDPR Password Manager Nanotechnology Employee Tools Work/Life Balance USB Unified Threat Management Frequently Asked Questions Recovery Public Cloud Cables Trend Micro Wireless Charging Inventory NIST Start Menu Procurement HIPAA File Sharing ISP OLED Using Data HVAC Sync Multi-Factor Security Criminal Data loss Batteries Wireless Digital Signature Printer WiFi Computer Fan Remote Computing Business Mangement Smart Tech Compliance Millennials Electronic Medical Records Wire Mobile Computing Excel Default App Software Tips Shopping Google Apps Employee/Employer Relationship Cryptomining Biometric Security Information Technology Online Shopping Virtual Machine Addiction Workforce Cortana Alert Virtual Private Network Credit Cards PDF YouTube Mouse Flash FENG Windows Server 2008 R2 Gmail Google Search Value Data Management Smart Office Tip of the week IT Infrastructure Social Network Workers Safe Mode Security Cameras Specifications Remote Worker Database Manufacturing Computing Evernote Cleaning Shortcuts Trending Hypervisor Remote Workers 5G Microchip HaaS Recycling Devices Save Time Document Management Camera Windows Server 2008 Solid State Drive Investment Printing Authentication Smartwatch Wiring Business Technology HBO Windows 10s Virtual Reality Professional Services The Internet of Things Practices Enterprise Content Management Mobility Downtime Vendor Management Hacker Cache Proactive IT Telecommuting Screen Mirroring Managed IT Service Amazon Search Engine Hard Drive eWaste Thought Leadership Competition Printers Customer Relationship Management Emergency IP Address Personal Information Digitize Customer Service Hard Drives Mobile Office Domains Search Financial Twitter Windows 10 Public Speaking CrashOverride Presentation Regulation Lithium-ion battery Managed Service Provider Wireless Technology Company Culture Tech Support Safety IBM Hiring/Firing Productivity Marketing Managing Stress Fun Budget