Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.
TREES PLANTED: 268
Last Updated: 6/27/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Productivity Best Practices Network Security Data Software IT Support Privacy Hackers Collaboration User Tips Hardware Innovation Computer Data Backup Efficiency Cybersecurity Google Hosted Solutions Tech Term Communications Email Data Recovery Android Internet Malware Small Business Business Management Phishing Cloud IT Services Managed IT Services Windows 10 Workplace Tips Backup Business Communication Outsourced IT VoIp Network Microsoft Office Mobile Device Microsoft Cloud Computing Smartphone Social Media Business Technology Server Mobile Devices Ransomware Smartphones Quick Tips Artificial Intelligence Access Control Upgrade Information Managed Service Facebook Alert Users Passwords IT Management Holiday Data Management Internet of Things Browser Apps Two-factor Authentication Automation Cost Management Data loss Mobile Device Management Vendor Managed Service Provider Remote Work Conferencing Apple Disaster Recovery Data Security Applications Spam Patch Management Encryption BDR Cybercrime Blockchain Government Office 365 Project Management Covid-19 Big Data Update Data Breach Healthcare Windows Business Continuity Remote Monitoring Analytics Vendor Management Gadgets Windows 7 Scam VPN App Augmented Reality Vulnerability Bandwidth Computing Operating System Voice over Internet Protocol Saving Money Websites Maintenance Antivirus Vulnerabilities Hard Drive Miscellaneous Information Technology Word Multi-factor Authentication Printer Cooperation Managed Services Provider Search Integration Telephone Retail Virtualization Software as a Service Mobility Managed Services Google Maps Budget Help Desk Networking Data Protection Computers Monitoring Save Money Meetings Start Menu Social Engineering Managed IT services Bitcoin Processor Laptop Professional Services How To Gmail Virtual Assistant Saving Time Document Management Mobile Office Downloads Digital Hacking Solutions History Tech Terms Managed IT iPhone Legislation Content Money Directions Free Resource Employer/Employee Relationships SaaS IT Assessment Computer Care Health IT Hard Drive Disposal Access Training Download Television Browsers Teamwork Downtime Unified Threat Management Humor IBM Desktop Legal Tip of the week Security Cameras Password Hypervisor Virtual Private Network Administration Proxy Server Computing Infrastructure VoIP eCommerce Uninterrupted Power Supply Financial Data Cleaning Microsoft Excel Storage Computer Repair Machine Learning BYOD Distributed Denial of Service Current Events Mobile Technology Smart Devices Device security Paperless Office email scam Medical IT Spyware Equifax Upload Mouse Employer/Employee Relationship Piracy Transportation Touchscreen Memes Corporate Profile Law Enforcement Social Network Social Hacker Outlook Procurement Customer Relationship Management Disaster Telework Cryptocurrency Display Office Devices Network Management Freedom of Information Microchip Value Electronic Health Records Database Sports PowerPoint Emergency Employee/Employer Relationship Startup Trends Entertainment SQL Server Software License Customer Service IT Chromebook WiFi Customer Resource management Cortana Router Licensing Supply Chain Management CrashOverride Business Cards Holidays Virtual Reality Nanotechnology Unified Communications Management Tech Wasting Time Worker Health Compliance FinTech Emails Travel News Memory Running Cable Surveillance Website Tactics Google Calendar eWaste Google Drive Data Storage Gamification Data Analysis Azure Private Cloud Communitications Audit Mobile Security Backup and Disaster Recovery Telephone System Modem Vendor Mangement Wi-Fi Redundancy Flexibility Regulations Service Level Agreement Comparison Microsoft 365 Time Management Optimization Knowledge Company Culture Printing Term Managing Costs Internet Service Provider YouTube Cyber security Solid State Drive DDoS PCI DSS Bluetooth Username Fake News Navigation Cabling Development Tablet Addiction User Tip Robot SharePoint Fileless Malware Avoiding Downtime Virtual Desktop Twitter Electronic Medical Records SSID Business Mangement Managed IT Service Remote Working Accountants Going Green Specifications Bookmark Virtual Machines Identity Theft Screen Reader Error Excel Google Play Virtual Machine Net Neutrality Settings Telephony Trend Micro Regulations Compliance Wireless Headphones Evernote Virus Video Conferencing How to HTML Google Docs Thank You Regulation Congratulations Multi-Factor Security Notifications Personal Information Managing Stress Financial Printers