This could have been a problem...
Scanning QR Codes can lead to malicious websites or downloads
To the average person, a QR code placed on a restaurant table, entrance door to a business, or a promotional shirt raises little concern.
But do we know for certain that it was put there by a legitimate representative of the business? It may have been placed by a “threat actor” riding on the coat tail of the legit reputation of the business, with the intent to hijack a client’s login credentials or other information assets.
Being mindful and knowing how to recognize threats is only one benefit of an Information Security Management System (ISMS). Controlling access to information assets in the first place another.
The Granite State InfoSec Companies are happy to help navigating these complexities. Contact us for a complimentary evaluation of how we may assist you.