Trend Micro

Enjoy Your Digital Life Safely . Learn more

Top Five Reasons Not to Skimp on Security

Cutting corners doesn't pay.

1. Cutting corners doesn’t pay

Whether it’s consumer or enterprise security there is one bottom line: there is no point in cutting corners when it comes to security. The ‘it won’t happen to me’ mentality is a recipe for disaster. The body of evidence and expert opinion in the security industry all points to one thing: everybody and every business is at risk: From the data in your home computer or phone to that in your business devices, hackers make no distinctions. Ransomware and malware targets anybody and everybody. There is no such thing as a safe partial solution. The only way to seamless protection is through a complete security and privacy solution.

2. Ransomware - it costs

Global leader in security software, Trend Micro says Ransomware is growing - and rapidly. It targets consumers and businesses. Victims of ransomware find their files (photos, videos and office files) encrypted while a ransom note covers their screen demanding payment. If they don’t pay on time, the one key to unlock the files gets destroyed. It’s a growing problem in Australia and New Zealand where variations of the threat are thriving. In Q1 2015, Australia was ranked number two for ransomware infections. The FBI said it received 992 CryptoWall complaints from April 2014 to June 2015, representing total losses of $18 million — and that is just reported cases. Because criminals are finding this scheme lucrative, hackers will continue to work on producing virus variants that are harder to detect and decrypt.

3. Potentially unwanted application or applications (PUAs)

PUAs are applications installed on a mobile device or a computer that may pose high risk or have untoward impact on user security and privacy. They may also consume high amounts of computing resources. They may be unwanted by the user even if they are installed with users' consent.

Trend Micro says PUAs can behave like the following:

Bundling – The primary application that installed the additional applications often tricks users during the installation process with options that allow the installation of the bundled software.

Advertising – displays excessive advertisements, causing interruption or annoyance to users.

Information collection – applications that collect information without users' consent.

Other unwanted behaviour includes exaggerated or bogus notifications; a lack of control for users; running of unwanted processes or applications that consume computing resources; providing an unconventional way of uninstalling the application.

4. Banking malware

Companies are finding it tough to keep out new types of banking malware which continue to get better following the bar-raising threat known as Zeus. The malicious programs all aim to secretly steal credentials for online bank accounts with some specialising in making large, unauthorized wire transfers from businesses using the ACH (Automated Clearing House) system. A study by the firm, SecurityScorecard, which specialises in tracking companies risk of intrusion, found more than 4700 organisations which were infected by some type of advanced banking malware. It’s insidious. reported on 13/05/14 that, “1-in-5 Australians have been victims of identity crime with computer hacking, online banking and shopping to blame. The amounts lost ranged from a few dollars to a staggering $310,000. The first indication anything was wrong usually was when they received their bank account statement.”

5. Mobile malware

Consider these facts from Trend Micro: There are now 10.6 million malicious and high-risk apps threatening mobile devices; 1 in 10 mobile users believe they have downloaded a malicious app to their device. Over 40 per cent of respondents to a Trend Micro poll in February 2015 had used their device for shopping or banking at least once in the past month. That’s why the greatest risk to your digital security could be in your pocket or your bag.

And this is just the tip of the iceberg. To help consumers combat malware, Trend Micro continues to focus on making everyone’s digital lives easier and safer. To offer consumers optimal protection, the global leader in security software has a bevy of suites including Trend Micro Security 10 – a security and privacy solution fully compatible with Microsoft Windows 10.

The latest version’s security features are simple to use and provide state-of-the-art protection for consumers’ data. They allow users to engage safely and securely online in today’s evolving, threat-infested environment. Trend Micro Security 10 provides protection on many devices and operating systems. It protects against exposing private information and data-theft. With the growing number of malicious threats, breaches, and hacks in the wild, you need a product like Trend Micro Security 10 to be safe online.

Don’t be a fool and risk everything: be secure.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

PC World Staff

PC World
Show Comments

Most Popular Reviews

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?