{"id":186,"date":"2025-08-13T10:19:00","date_gmt":"2025-08-13T09:19:00","guid":{"rendered":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/?p=186"},"modified":"2025-11-21T13:28:41","modified_gmt":"2025-11-21T13:28:41","slug":"qr-codes-how-convenience-can-lead-to-crisis","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/qr-codes-how-convenience-can-lead-to-crisis\/","title":{"rendered":"QR codes: How convenience can lead to crisis"},"content":{"rendered":"\n<p>They\u2019re on food and drink packaging, restaurant menus and tabletops, clothing tags, car parks, business cards \u2013 yes, QR codes are everywhere. We\u2019re being encouraged at every turn to use our smartphones to scan the rectangular series of black and white shapes so we can receive more information on a website, access promotional content or sign up for something.<\/p>\n\n\n\n<p>It&#8217;s supposed to be a convenient and interactive way to keep the experience going but this comes with risks and who knows this better than cybercriminals?<\/p>\n\n\n\n<p>The exploitation of QR code technology<\/p>\n\n\n\n<p>Last year, Action Fraud reported that QR code scams known as QRishing \u2013 QR code phishing \u2013 had increased by 1,268% in five years. Simply looking at a code can\u2019t determine what\u2019s behind it which demonstrates why this is an effective vehicle for hackers.<\/p>\n\n\n\n<p>Criminals are creating fake codes that redirect to malicious websites or activate unwanted downloads and malware so they can steal data, personal credentials and\/or compromise the device. That moment of practicality can quickly lead to a full-blown cyber emergency.<\/p>\n\n\n\n<p>Safer scanning for your small business<\/p>\n\n\n\n<p>QR codes don\u2019t have to be completely avoided but there are things SMEs can do to decrease the possibility of harm.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Educating employees is everything: Security awareness training is the first step in helping your team recognise what the red flags are. If a code is in an unusual\/unexpected location or from a untrusted source \u2013 exercise caution and don\u2019t scan it. The WCRC offers bespoke, non-technical training sessions designed so people with limited cyber knowledge can become confident with the basics<\/li>\n\n\n\n<li>Use a QR code scanner with previews: QR code scanner apps that show a preview of the URL before opening it will verify whether the link is genuine and not a malicious site before proceeding.<\/li>\n\n\n\n<li>Checking your own business\u2019 QR codes are secure: If your business has its own QR codes for marketing or operations, ensure they are generated through trusted and secure platforms only. Review and monitor the codes regularly to check they haven\u2019t been tampered with and be sure to keep an eye on the websites they link to as well.<\/li>\n\n\n\n<li>Implement strong cyber security measures: Are your devices and networks have up-to-date security software that detects and blocks malware? If not, make this an urgent action. A robust cyber security strategy means reduced risk of infection from malicious links and downloads.<\/li>\n\n\n\n<li>Get in touch with us: QR code scams affect businesses in Tenby, Portmeirion, Caerphilly, Deeside and everywhere in between. The WCRC offers guidance on how to stay ahead of the dangers, so please <a href=\"https:\/\/www.wcrcentre.co.uk\/contact-us\">contact us<\/a> for further support on bettering the safety of your SME and team members.<\/li>\n<\/ol>\n\n\n\n<p>Having awareness of the cyber concerns surrounding QR codes and implementing best practice measures, means you can use the technology safely and securely.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>They\u2019re on food and drink packaging, restaurant menus and tabletops, clothing tags, car parks, business cards \u2013 yes, QR codes are everywhere. We\u2019re being encouraged&#8230;<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-186","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/posts\/186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":1,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/posts\/186\/revisions"}],"predecessor-version":[{"id":187,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/posts\/186\/revisions\/187"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/media?parent=186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/categories?post=186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/walescrc\/wp-json\/wp\/v2\/tags?post=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}