{"id":57669,"date":"2023-05-16T08:31:09","date_gmt":"2023-05-16T12:31:09","guid":{"rendered":"https:\/\/insi.net\/?p=57669"},"modified":"2023-05-16T08:31:09","modified_gmt":"2023-05-16T12:31:09","slug":"qr-code-cybersecurity-tips-for-atlanta-businesses","status":"publish","type":"post","link":"https:\/\/insi.net\/cybersecurity\/qr-code-cybersecurity-tips-for-atlanta-businesses\/","title":{"rendered":"QR Code Cybersecurity Tips for Atlanta Businesses"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”]<\/p>\n

INSI QR Code Cybersecurity Tips for Atlanta Businesses.<\/p>\n

QR codes have been around since 1994. However, the popularity of QR codes reached its height in 2020 when the world moved to a contactless society. At that time, Innovative Network Systems, Inc. (INSI) warned our readers of the dangers of QR codes, and that threat has only accelerated since. The Federal Burrough of Investigation (FBI)<\/a> has also issued a warning on QR codes.<\/p>\n

<\/h2>\n

What are QR Codes?<\/h2>\n

QR codes are smart device matrix barcodes that contain locater, identifier, or tracking data. After the user swipes the link, it redirects the user to a website or application.\u00a0<\/p>\n

QR codes have become commonplace in recent years. You can find them on marketing pamphlets, store windows, bus stops, informational flyers, real estate signs, business cards, and even games like Pokemon Pokedex, to name a few.\u00a0<\/p>\n

How Can QR Code Swiping Hurt a Small Business?<\/h2>\n

The human eye cannot read QR codes, allowing scammers to easily disguise the images with malicious code that gives them access to company applications like email or shared files. In addition, most QR codes contain cookies that track the patron\u2019s purchase history, contact information, and location.<\/p>\n

In 2018, Norton LifeLock Cyber Safety Insights Reported that 75% of Americans knew their smart devices could be hacked, and 80% knew that it could give cybercriminals access to all of the data on their devices. Yet, they keep swiping.<\/p>\n

Below are the most recent QR code fraud schemes that have hit the news:<\/h2>\n

<\/h2>\n

<\/h2>\n

QR Code Cybersecurity Tip 1: Parking Lots\u00a0<\/h3>\n

Fraudulent QR codes are popping up in pay-to-park stations across the United States. Unfortunately, many have reported their patrons have been redirected to sites that store bank information or download dangerous malware to the patron’s device.\u00a0<\/p>\n

<\/strong><\/h2>\n

<\/strong><\/h2>\n

QR Code Cybersecurity Tip 2: Restaurants<\/h3>\n

Since 2020, the restaurant industry has been hit hard with staffing shortages and rising costs. However, QR Codes have helped reduce labor costs and order errors by 40%. Many found new ways to generate additional revenue through membership rewards and merchandise sales. Unfortunately, cyber thieves quickly learned how to replace the code with a link to a fake, realistic-looking site asking end-users to set up an account or divulge personal information.\u00a0<\/p>\n

QR Code Cybersecurity Tip 3: Phishing Emails<\/h3>\n

Cyber thieves are now inserting QR codes into phishing emails. This is because sophisticated cyber thieves know that the security software cannot detect QR codes, but they can see attachments and links. Therefore, they have a better chance of luring their intended target. It is also easier and less risky to cast out a wide phishing net than to physically put QR codes on parking meters or other physical sites.\u00a0<\/p>\n

Protect Your Business from QR Code Swipers<\/h2>\n

If you are concerned about your end-users swiping malicious QR codes, then you need a way to assess and protect your data at your endpoints. INSI has three programs that could help with this:<\/p>\n

Fortify-IT<\/strong><\/em><\/a> \u2013 Our Mobile Threat Defense (MTD) program provides mobile protection for your general employee population and BYOD users. This program will provide reporting, assistance with end-user remediation, policy creation, assisted deployment, threat escalations, and mobile advisory and recommendations.<\/p>\n

MobileAssess-IT<\/a> \u2013 INSI\u2019s Mobile Risk Assessment, MobileAssess-IT, provides experienced assessment experts who evaluate security risks to mobile phones\/tablets, establish policies, assess the impact on policies, and recommend actions to secure and align mobile devices to your business practices.<\/p>\n

Phishing Test and Training<\/a> – INSI will send your end-users fake emails with phishing links in them. Once an end-user clicks on the email, it will immediately notify our team of which email and the link they opened. We can use this to help train your end-users on what to look for so they will not fall victim to a real-life scenario.<\/span>\u00a0<\/span><\/p>\n

<\/strong><\/h3>\n

About INSI: The Best MSP in Atlanta!<\/p>\n

 <\/p>\n

Innovative Network Systems, Inc. has a unique approach to integrating IT support<\/a> and cybersecurity<\/a>. Our month-to-month programs range from basic support to proactive support, managed support, and customized support. Each program is tailored to the client’s needs and internal IT strengths.\u00a0\u00a0<\/p>\n

For more information about cybersecurity dangers and the preventative measures for your company, connect with the top MSP in Atlanta; Contact INSI: 770-387-2424, option 2 or click the link below. In addition, we offer 16 different cybersecurity programs<\/a> to protect you and your data.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_button button_url=”https:\/\/insi.net\/connect-with-insi\/” button_text=”Connect With INSI” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

 <\/p>\n

About the Author<\/span><\/h2>\n

Deborah Frazier<\/a>\u00a0is the author of\u00a0IT Outsourcing Secrets \u2013 A Small Business Guide to Compare IT Support Companies.<\/em><\/strong> With nearly 20 years of experience consulting small and medium-sized businesses on their IT support needs, she brings a wealth of knowledge to INSI as Head of Marketing and Sales. If you like this article and want to get notified when a new article is posted, click here<\/a>.<\/p>\n

To make an appointment for more information about INSI and our Marietta and Atlanta metro IT Support services, click here<\/a>.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

INSI QR Code Cybersecurity Tips for Atlanta Businesses. QR codes have been around since 1994. However, the popularity of QR codes reached its height in 2020 when the world moved to a contactless society. At that time, Innovative Network Systems, Inc. (INSI) warned our readers of the dangers of QR codes, and that threat has […]<\/p>\n","protected":false},"author":3,"featured_media":62735,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"

[et_pb_section fb_built=\"1\" _builder_version=\"3.22\"][et_pb_row _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text _builder_version=\"3.27.4\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"]<\/p>

Get to know the best Facebook cybersecurity practices with these helpful tips and tricks.
Have you ever noticed people on Facebook that have over one thousand \u201cfriends?\u201d It\u2019s a strange phenomenon, but many people measure their self-worth by their \u201cfriend\u201d count. If you are one of these people, you need to think twice about who you allow to be your friend.<\/p>

Lately, I have received many Facebook friend requests from people I am already connected to and complete strangers. Due to my background, I know better than to accept these friendship requests and alert my hacked friends. But I realized many of my friends must be falling for these hacks, or I wouldn\u2019t get so many imposter friendship requests. So, I decided to share the types of Facebook scams, how to avoid them, and what to do if you fall for one.<\/p>

Types of Facebook Cybersecurity Scams<\/h2>

Below are the reasons and ways bad actors scam you.<\/p>