Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.
TREES PLANTED: 60
Last Updated: 2/1/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Network Security Software Productivity Data IT Support Privacy Computer User Tips Hackers Hardware Data Backup Efficiency Tech Term Innovation Cybersecurity Email Communications Hosted Solutions Data Recovery Android Collaboration Google Malware Managed IT Services Internet Windows 10 Business Management IT Services Phishing Business Cloud Backup Small Business Outsourced IT Mobile Device VoIp Workplace Tips Microsoft Communication Artificial Intelligence Network Ransomware Server Cloud Computing Microsoft Office Mobile Devices Social Media Smartphones Smartphone Facebook Access Control Information Business Technology Upgrade Managed Service Passwords IT Management Data Management Holiday Two-factor Authentication Automation Alert Internet of Things Browser Cybercrime Blockchain Data loss Apps Conferencing Government Apple Office 365 Applications Mobile Device Management Managed Service Provider Cost Management Patch Management Quick Tips BDR Websites Maintenance Antivirus Miscellaneous Data Breach Analytics Project Management Vulnerabilities Disaster Recovery Users Gadgets Big Data Vendor App Healthcare Bandwidth Windows Data Security Saving Money Spam Remote Monitoring Scam Encryption VPN Hard Drive Vulnerability Operating System Update Document Management Tech Terms Virtualization Managed IT iPhone Data Protection Cooperation Save Money Downloads Start Menu Hacking Computers Telephone Retail Software as a Service Laptop Managed IT services Google Maps Monitoring Help Desk Mobility Business Continuity Vendor Management Windows 7 Digital Networking Processor History Managed Services Provider Professional Services Social Engineering Saving Time Search Computing Word Bitcoin Augmented Reality Multi-factor Authentication Printer Voice over Internet Protocol Gmail Virtual Assistant Bookmark Solutions Spyware Display Comparison Cleaning Error Google Play Printing Business Mangement Customer Relationship Management Machine Learning Value Electronic Health Records Robot BYOD Evernote Corporate Profile Meetings Fake News Device security Paperless Office Equifax Upload Directions Employer/Employee Relationships Licensing SharePoint Virus Health IT SQL Server Telephony IT Browsers Integration Wasting Time Specifications SaaS Computer Care Security Cameras Holidays Excel Devices Network Management CrashOverride Memory Google Docs Unified Threat Management Password How To Database Proxy Server Startup Trends Wi-Fi Money Information Technology Chromebook Medical IT Worker Azure VoIP Communitications Hard Drive Disposal Transportation Managing Costs Television Downtime Virtual Reality Nanotechnology Social Network Social Running Cable Legal Optimization Tip of the week Compliance Touchscreen Computing Infrastructure Emails Travel Cyber security Microsoft Excel Outlook Website Tactics Mobile Office Virtual Desktop email scam Disaster Gamification Microchip Managed IT Service Distributed Denial of Service Mobile Technology Mobile Security Backup and Disaster Recovery Sports PowerPoint YouTube Entertainment Customer Service Solid State Drive Virtual Machine Mouse Piracy Company Culture Customer Resource management Router Cabling Tablet Law Enforcement Virtual Machines Emergency Regulations Service Level Agreement Budget Bluetooth Username Management Tech Trend Micro Cryptocurrency Addiction Free Resource IT Assessment Freedom of Information Twitter Settings Going Green Data Analysis Private Cloud Hypervisor Software License Identity Theft Screen Reader Telephone System Modem How to Teamwork WiFi Google Drive Humor Cortana Accountants Microsoft 365 Access Storage Business Cards Audit Wireless Headphones Term Unified Communications Vendor Mangement eCommerce Redundancy HTML Current Events Google Calendar Time Management Smart Devices eWaste Knowledge Legislation Content Navigation IBM Managed Services News User Tip Administration Training Download Fileless Malware Avoiding Downtime Uninterrupted Power Supply Hacker Desktop Electronic Medical Records SSID Employer/Employee Relationship Memes DDoS Printers Congratulations Surveillance Regulation Personal Information Multi-Factor Security Financial Managing Stress Thank You