Trend Micro

Enjoy Your Digital Life Safely

Top Five Reasons Not to Skimp on Security

Cutting corners doesn't pay.

1. Cutting corners doesn’t pay

Whether it’s consumer or enterprise security there is one bottom line: there is no point in cutting corners when it comes to security. The ‘it won’t happen to me’ mentality is a recipe for disaster. The body of evidence and expert opinion in the security industry all points to one thing: everybody and every business is at risk: From the data in your home computer or phone to that in your business devices, hackers make no distinctions. Ransomware and malware targets anybody and everybody. There is no such thing as a safe partial solution. The only way to seamless protection is through a complete security and privacy solution.

2. Ransomware - it costs

Global leader in security software, Trend Micro says Ransomware is growing - and rapidly. It targets consumers and businesses. Victims of ransomware find their files (photos, videos and office files) encrypted while a ransom note covers their screen demanding payment. If they don’t pay on time, the one key to unlock the files gets destroyed. It’s a growing problem in Australia and New Zealand where variations of the threat are thriving. In Q1 2015, Australia was ranked number two for ransomware infections. The FBI said it received 992 CryptoWall complaints from April 2014 to June 2015, representing total losses of $18 million — and that is just reported cases. Because criminals are finding this scheme lucrative, hackers will continue to work on producing virus variants that are harder to detect and decrypt.

3. Potentially unwanted application or applications (PUAs)

PUAs are applications installed on a mobile device or a computer that may pose high risk or have untoward impact on user security and privacy. They may also consume high amounts of computing resources. They may be unwanted by the user even if they are installed with users' consent.

Trend Micro says PUAs can behave like the following:

Bundling – The primary application that installed the additional applications often tricks users during the installation process with options that allow the installation of the bundled software.

Advertising – displays excessive advertisements, causing interruption or annoyance to users.

Information collection – applications that collect information without users' consent.

Other unwanted behaviour includes exaggerated or bogus notifications; a lack of control for users; running of unwanted processes or applications that consume computing resources; providing an unconventional way of uninstalling the application.

4. Banking malware

Companies are finding it tough to keep out new types of banking malware which continue to get better following the bar-raising threat known as Zeus. The malicious programs all aim to secretly steal credentials for online bank accounts with some specialising in making large, unauthorized wire transfers from businesses using the ACH (Automated Clearing House) system. A study by the firm, SecurityScorecard, which specialises in tracking companies risk of intrusion, found more than 4700 organisations which were infected by some type of advanced banking malware. It’s insidious. reported on 13/05/14 that, “1-in-5 Australians have been victims of identity crime with computer hacking, online banking and shopping to blame. The amounts lost ranged from a few dollars to a staggering $310,000. The first indication anything was wrong usually was when they received their bank account statement.”

5. Mobile malware

Consider these facts from Trend Micro: There are now 10.6 million malicious and high-risk apps threatening mobile devices; 1 in 10 mobile users believe they have downloaded a malicious app to their device. Over 40 per cent of respondents to a Trend Micro poll in February 2015 had used their device for shopping or banking at least once in the past month. That’s why the greatest risk to your digital security could be in your pocket or your bag.

And this is just the tip of the iceberg. To help consumers combat malware, Trend Micro continues to focus on making everyone’s digital lives easier and safer. To offer consumers optimal protection, the global leader in security software has a bevy of suites including Trend Micro Security 10 – a security and privacy solution fully compatible with Microsoft Windows 10.

The latest version’s security features are simple to use and provide state-of-the-art protection for consumers’ data. They allow users to engage safely and securely online in today’s evolving, threat-infested environment. Trend Micro Security 10 provides protection on many devices and operating systems. It protects against exposing private information and data-theft. With the growing number of malicious threats, breaches, and hacks in the wild, you need a product like Trend Micro Security 10 to be safe online.

Don’t be a fool and risk everything: be secure.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

PC World Staff

PC World
Show Comments

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Cate Bacon

Aruba Instant On AP11D

The strength of the Aruba Instant On AP11D is that the design and feature set support the modern, flexible, and mobile way of working.

Dr Prabigya Shiwakoti

Aruba Instant On AP11D

Aruba backs the AP11D up with a two-year warranty and 24/7 phone support.

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?