ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

What Happened?

We aren’t shy about informing our clients about the potential dangers of allowing access to more than an employee needs to do their job. This is a practical example of why we say that.

The (now former) Trend Micro employee was able to access more data than they needed to have. Trend Micro provided a pretty succinct explanation of the situation, saying that the employee was able to “gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. There are no indications that any other information such as financial or credit payment information was involved…”

The perpetrator's name has not yet been made public, but whoever they were, they were able to bypass Trend Micro’s internal protections.

Consider what it would take for a phone scam to really be convincing: really, if you were called by someone from “Trend Micro” who knew who you were and that you were a user of their product, you wouldn’t have much reason to doubt them, would you? The data that was up for grabs at Trend Micro contained much more information than that, making it potentially even more valuable to a cybercriminal or scam artist.

You Need to Watch Out for Unsolicited Tech Support Calls

As you might imagine, this scam has been around for about as long as there have been personal computers and is in no way exclusive to Trend Micro customers. Tech support scams have been used to target users for years, often profiling users by their age to find victims more likely to fall for the ruse. Combining this profiling with scare tactics and put-on urgency, the scammer is able to shock their target into handing over their credit card information or allowing the scammer to access their PC remotely.

It isn’t uncommon for these scammers to identify themselves as a member of some “Microsoft Windows support team” or another support company. If the targeted business is big enough, a scammer may just claim to be from the IT department.

This is why you have to be sure that all of your employees know how to have their technology support questions addressed through the right channels.

You Also Need to Keep Your Employees from Accessing More than They Need

Take a critical look at the permissions you afford your employees as far as your network is concerned. How accessible are the folders you store your sensitive information in, like a client’s personal data or financial information?

Best practices dictate that an employee only be given access to what they need to do their job, while common sense dictates that you can’t make an employee’s job too difficult for them, either. Striking a balance between the two can be tricky but working with your IT provider to establish permissions makes it far easier.

If you want to avoid potentially running into a similar situation as Trend Micro did, enforcing security policies is a step you need to take. Doing so should include access control to certain files and areas of your network, requiring MFA/2FA (multifactor/two-factor authentication), and quite a bit of planning to put it all together. However, if it keeps your data safe from threats (inside and out), it’ll be worth the damage control you get to avoid.

If you could use some assistance in securing your network and educating your employees about how scams can be identified, give ClearView IT a call. Our professionals are here to help - call 866-326-7214 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Communication Data Recovery Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Disaster Recovery Covid-19 Managed Service Windows 10 IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Internet of Things Remote Work Saving Money Operating System Government Networking Windows Artificial Intelligence Gadgets Managed IT services Workplace Strategy Mobile Device Management App WiFi Virtualization Business Technology Blockchain Spam Server Bandwidth Information Remote Encryption Gmail Office Apple Two-factor Authentication Information Technology Office 365 History Budget Employee/Employer Relationship Analytics BDR Big Data Conferencing Access Control Health Data Security Cybercrime Wi-Fi Remote Monitoring Remote Computing Help Desk Voice over Internet Protocol Hacking Cost Management IT Management Training Document Management Hacker Save Money Employer-Employee Relationship Compliance Patch Management Vendor IBM Hiring/Firing Project Management Website Computing Outlook Vulnerabilities Password Vendor Management Hard Drive Mobile Office Managed Services Legal Data loss Data storage Money Search... Best Practice Customer Service Unified Threat Management Firewall Retail Augmented Reality Alert Word Applications BYOD User Maintenance Windows 11 Router Monitoring Healthcare The Internet of Things Chrome Websites YouTube Remote Workers Twitter Meetings Mobility Windows 7 Law Enforcement Free Resource Laptop End of Support Google Maps Printer Mobile Computing Scam How To Marketing Running Cable VPN Sports Travel Update Social SaaS DDoS Virtual Reality Storage Social Engineering Cryptocurrency Black Market Data Breach iPhone Cleaning Paperless Office Education Cortana Antivirus Robot Content Filtering Video Conferencing Physical Security Solid State Drive Virtual Machines Computer Repair Processors Multi-factor Authentication Professional Services Start Menu Chromebook Drones Computer Care Downloads Automobile Vulnerability Saving Time Software as a Service Managed Services Provider Bitcoin How To PowerPoint Data Protection Computers Wireless Technology Microchip Administration Virtual Private Network Flexibility Telephone eWaste Presentation Specifications Current Events Downtime IT Consultant Excel Solutions Hack Safety Identity Theft Notifications Customer Relationship Management Unified Communications Co-Managed IT Integration Virtual Desktop Tech Terms Images 101 Experience Entertainment Google Docs Display Managed IT Bluetooth Digital Virtual Assistant Distributed Denial of Service Office Tips Private Cloud Employees Memory Taxes Avoiding Downtime Disaster Holidays Processor Politics Cooperation Machine Learning Settings HIPAA Lithium-ion battery Cache Addiction Entrepreneur Google Wallet email scam Teamwork LiFi Navigation 2FA Banking Documents Messenger Unified Threat Management Data Storage Application Deep Learning Workers Mobile Security Hypervisor News Medical IT User Tip Shopping Legislation Business Intelligence Network Management Hosted Solution CCTV SQL Server Printing Evernote Paperless Business Metrics Business Owner Securty Books Touchscreen PCI DSS Licensing Computer Malfunction Fake News Supply Chain Emergency Proxy Server Gig Economy Domains Language Emails Humor Society Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Business Communications Reading Management Regulations Compliance Monitors Samsung Device security Managed IT Service Visible Light Communication Windows 8 Webcam Microsoft Excel Workplace Uninterrupted Power Supply Wireless Headphones Memes Inbound Marketing Business Mangement Going Green Net Neutrality Business Cards Tech Human Resources Relocation Error Financial Data Public Speaking Displays Tablets Advertising Tech Support Scams Streaming Media Bookmark Risk Management Work/Life Balance IT Download Keyboard Supercomputer Piracy Google Calendar Term Google Apps Electronic Payment Virus Telework Hard Drives HTML intranet Motion Sickness Microsoft 365 Cables In Internet of Things Browsers Smartwatch Nanotechnology Communitications Wireless Hacks Google Drive Upload Procurement Shortcut Network Congestion Software License Comparison Google Play Reliable Computing Social Network FinTech Heating/Cooling Writing Phone System Environment Social Networking Point of Sale Windows XP Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Television Security Cameras Scalability Customer Resource management Organization Cabling Devices Cyber security Shortcuts Proactive IT G Suite Tip of the week Administrator Fileless Malware Text Messaging Tablet Smart Devices Mouse Bring Your Own Device VoIP Gamification Remote Working Computer Accessories Tracking Company Culture Telephone System AI Regulations Trend Micro Be Proactive Backup and Disaster Recovery Electronic Health Records Music Web Server Transportation Directions Digital Security Cameras SharePoint Staffing Content Digital Payment Desktop Wasting Time Modem Workplace Strategies Electronic Medical Records IP Address Worker Accountants eCommerce Access Database Surveillance Botnet Videos Rental Service Time Management Micrsooft Public Cloud Managing Costs SSID Health IT Flash Equifax Spyware Tactics Development Business Growth Hard Drive Disposal Employer/Employee Relationships Audit Media Telephone Systems Troubleshooting Recovery Username Competition File Sharing Virtual Machine Freedom of Information Smart Technology Redundancy Reviews Startup Optimization

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?