{"id":6489,"date":"2020-11-18T08:52:28","date_gmt":"2020-11-18T03:22:28","guid":{"rendered":"https:\/\/www.hexnode.com\/blogs\/?p=6489"},"modified":"2022-09-16T08:08:35","modified_gmt":"2022-09-16T02:38:35","slug":"why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security","status":"publish","type":"post","link":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/","title":{"rendered":"Why QR codes might be the weakest link in your enterprise security"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">Quick Response (QR) codes have always been popular, ever since it was first introduced in 1994 for the automotive industry in Japan. You can simply scan a QR code for code payments, to display text or message to users, to open a website URL, to save a vCard contact to the user\u2019s smartphone, for website login, or even to compose an email by simply scanning a QR code. With the COVID-19 threat looming over our heads, using QR codes for contactless transactions and interactions has become even more popular, adding on to the already large user base of QR codes.<\/span><\/p>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Scan-to-sign-up-for-hexnode.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Scan-to-sign-up-for-hexnode.jpg\" alt=\"Scan to sign up for Hexnode\" width=\"564\" height=\"352\" \/><\/a><\/center><center><em>Scan now to sign up for Hexnode&#8217;s 14-day free trial<\/em><\/center><span class=\"s1\">The question is: <em>Are QR codes really secure?<\/em><\/span><\/p>\n<p><span class=\"s1\">For a business or an enterprise, <a href=\"https:\/\/www.hexnode.com\/blogs\/zero-trust-and-cybersecurity-with-hexnode-mdm\/?utm_source=hexnode_blog_qr_codes_enterprise_security&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity<\/a> remains a high priority. While QR codes can make lives simpler, it could also turn out to be a source of malicious attacks. When you scan a QR code, how can you be sure that it is legitimate? What are the threats posed by QR codes?<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\"><b>Security risks associated with QR codes<\/b><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">More than 20 percent of the Trojans and viruses are transmitted via QR codes. The threat posed by QR codes is manageable as it is not possible to hack QR codes. However, creating a QR code with explicit malicious intent is simple with readily available automated QR code generators. The possible attack scenarios can be summarised as: <\/span><\/p>\n<h3><span class=\"s1\"><strong>1. Malicious software attack<\/strong> <\/span><\/h3>\n<p><span class=\"s1\">Cybercriminals often target unsuspecting users by embedding a malware in malicious websites. When the user visits such websites, the malware gets automatically downloaded to the user\u2019s device. This attack is called drive by download attack. Malicious apps could be installed via drive by download attack which would then exploit the device to leak sensitive data. Android smartphones are a particular target for these attacks. If the attacker uses a QR code to point towards the malicious website, the users can be tricked easily since they cannot see the web URL.<\/span><\/p>\n    \t\t<div class=\"hts-messages hts-messages--info    \"   >\r\n    \t\t\t    \t\t\t    \t\t\t\t<p>\r\n    \t\t\t\t\t<\/p>\n<h4><span class=\"s1\">A true event<\/span><\/h4>\n<p><span class=\"s1\">In 2011, Russian consumers became the victims of a malicious QR code scam. The QR code was disguised to download an Android app while downloading malware to the smartphone. After the download, the malware sent SMS to premium numbers, thus costing the users 5 USD per SMS.<\/span><\/p>\n<p>    \t\t\t\t<\/p>\r\n    \t\t\t    \t\t\t\r\n    \t\t<\/div><!-- \/.ht-shortcodes-messages -->\r\n    \t\t\n<h3><strong><span class=\"s1\">2. Links to harmful websites<\/span><\/strong><\/h3>\n<p><span class=\"s1\">Sometimes, websites can do a lot more harm than simply installing malware on your device. These websites may contain browser exploits &#8211; a malicious code that takes advantage of any vulnerabilities in your operating system. Browser exploits may gain access to the device camera or microphone, send emails, access browser data and more. The users would remain blissfully unaware as the attacks take place in the background, while the users just see a harmless website.<\/span><\/p>\n<h3><strong><span class=\"s1\">3. Phishing<\/span><\/strong><\/h3>\n<p><span class=\"s1\">Any discussion of cyberattacks is incomplete without discussing phishing. Phishing is a very prevalent method for hacking into web accounts. The attacker poses as a legitimate website and tricks the user into entering his\/her\/their login information or other sensitive data. The phishing attacks caused due to QR codes are also known as QRishing amongst researchers. <\/span><\/p>\n    \t\t<div class=\"hts-messages hts-messages--alert    \"   >\r\n    \t\t\t    \t\t\t    \t\t\t\t<p>\r\n    \t\t\t\t\t<\/p>\n<p><span class=\"s1\"><span class=\"s1\"><strong>QRLJacking(Quick Response Login Jacking):<\/strong> QRLJacking is an attack vector that uses the \u201cLogin with QR code\u201d feature to gain access to all the applications that utilize it. The user is convinced to scan the attacker\u2019s QR code instead of the secure one.<\/span><\/span><\/p>\n<h4><b>Attack Flow of QRLJacking<\/b><\/h4>\n<ol>\n<li>A client-side QR session is initiated by the attacker. The Login QR code is then cloned to a phishing website. This fraudulent website with a valid and updated QR code is then sent to the victim.<\/li>\n<li>The victim scans the QR code using the target app.<\/li>\n<li>The attacker gains control over the victim\u2019s account. All the user data is exchanged with the attacker\u2019s session.<\/li>\n<\/ol>\n<p>    \t\t\t\t<\/p>\r\n    \t\t\t    \t\t\t\r\n    \t\t<\/div><!-- \/.ht-shortcodes-messages -->\r\n    \t\t\n<h4><b>Login with QR codes &#8211; The risk vs utility <\/b><\/h4>\n<p>Any authentication method is only usable if it is more secure than it is susceptible to risks. The traditional method of using credentials like username and password to login is still the most prevalent method for login used. This credential-based authentication has many shortcomings, with risks like phishing and issues like password fatigue(the need for the users to remember a large number of passwords for different accounts). The introduction of new approaches like \u201cSingle-Sign-On\u201d has relieved password fatigue by using a single account to authenticate to multiple services. It does come with its own shortcomings as losing one password would mean the loss of all the services associated with the SSO system.<br \/>\nLogin with QR codes is an SSO model that uses QR code-based one-time passwords to login to the required service. At the first glance, this login method seems secure and reliable. However, if the user gets tricked to authenticate a malicious hacker to the target web services (such as in QRLJacking), it defeats the whole purpose of logging in with QR codes.<\/p>\n<h2 class=\"p1\"><span class=\"s1\"><b>Preventing QR code attacks<\/b><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Caution is the primary step that you can take for preventing QR code attacks. The scope of malicious QR codes is limited but harmful. If you are an IT admin, educate the device users to take the following precautions while using QR codes in their daily lives:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\">Check the URL before providing any information: Use a QR code scanner that shows the actual URL and verifies with you whether to proceed or not. Go to the website only if the website is from a trusted source.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Avoid providing your credentials to the websites that you land on via QR code unless it is a verified website.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Do not scan the random QR codes in public posters. The attackers may be testing out a malicious code. Also, do not scan a QR code that seems to be pasted on legitimate marketing material. Since QR codes cannot be hacked, attackers may add on the malicious code over the legitimate one to trick the user.<\/span><\/li>\n<\/ul>\n<h3 class=\"p1\"><span class=\"s1\"><b>QR Code Enterprise Security with Hexnode<br \/>\n<\/b><\/span><\/h3>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Scanning-QR-code.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Scanning-QR-code.jpg\" alt=\"Scanning the QR code to go to a website\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>Scanning a QR code to go to a website<\/em><\/center>&nbsp;<\/p>\n<p><b><\/b><span class=\"s1\"><b>Web content filtering<\/b><\/span><\/p>\n<p><span class=\"s1\">The majority of QR code attacks result by directing the users to a harmful website. For devices enrolled with Hexnode MDM, the <a href=\"https:\/\/www.hexnode.com\/blogs\/what-is-web-content-filtering\/?utm_source=hexnode_blog_qr_codes_enterprise_security&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">web content filtering<\/a> feature allows the admin to block the websites with potentially harmful content, thus preventing the users from accessing it.<\/span><\/p>\n<p><span class=\"s1\"><b>Web content filtering for iOS devices<\/b><\/span><\/p>\n<p><span class=\"s1\">This feature is supported for supervised iOS devices running on iOS 7.0 or later. For the enrolled devices, the admin can either blacklist or whitelist the required websites in a policy and push it to the devices. The admin can also restrict the inappropriate content to automatically filter any inappropriate websites. If the admin needs to exempt certain websites from the auto filtering, the required website URL can be added in the policy itself. On configuring web content filtering, private browsing will be disabled, hence decreasing the chance for an attack even more.<span class=\"Apple-converted-space\">\u00a0 <\/span><\/span><\/p>\n<p><span class=\"s1\"><b>Web content filtering for Android devices<\/b><br \/>\nWeb content filtering is supported for Android 6+ <a href=\"https:\/\/www.samsungknox.com\/en\/knox-platform\/supported-devices\" target=\"_blank\" rel=\"noopener noreferrer\">Samsung Knox devices<\/a>. Just as with iOS devices, the admin can enable web filters for the enrolled devices. The users would be able to access only the whitelisted websites and would not be able to access any of the blacklisted ones. <\/span><\/p>\n<p><b><\/b><span class=\"s1\"><b>Web App Kiosk Mode<\/b><\/span><\/p>\n<p><span class=\"s1\">Web-based Kiosk or Web App Kiosk mode or Browser Lockdown are the terms used to define the locking down the device into a web browser that can access only limited pre-specified website URLs by the admin. Web-based kiosks are useful for different businesses and greatly reduces the scope of QR code attacks.<\/span><\/p>\n<p><span class=\"s1\"><b>Web App Kiosk Mode for iOS devices<\/b><br \/>\nSupported on supervised devices running on iOS 9.3 or later, web app kiosk mode allows the user to open the websites using either Safari or Hexnode Browser. If the admin uses the Hexnode Browser for the website kiosk, the admin can configure additional browser settings such as customizing the browser toolbar, cache settings, schedule page refreshes, choose whether to allow Javascript or not and many more.<\/span><\/p>\n<p><span class=\"s1\"><b>Web App Kiosk Mode for Android devices<\/b><br \/>\nThe website URLs can be added as Web Apps to add them to the website kiosk. The Web App Kiosk Mode for Android devices uses a safe browser &#8211; Hexnode Browser Lite, Hexnode Kiosk browser or any browser of the admin\u2019s choice. For Hexnode Kiosk Browser, there are both single tabbed and multi-tabbed browsing options and the users will be able to access only the whitelisted websites. The admin can configure additional settings for the browser such as toolbar customization, theme color, appearance settings, scheduled refresh, cache settings, content settings and many more.<\/span><\/p>\n<p><b><\/b><span class=\"s1\"><b>Camera restrictions<\/b><\/span><\/p>\n<p><span class=\"s1\">Any QR code attack would be successful only if the user actually scans the malicious code. Depending on the business use-case, the admin can choose to disable the camera of the user\u2019s smartphone, thus entirely removing the threat at its root level. Hexnode allows you to restrict the camera usage for iOS and Android devices.<\/span><\/p>\n<p><b><\/b><span class=\"s1\"><b>Safari restrictions for iPhones\/iPads<\/b><\/span><\/p>\n<p><span class=\"s1\">Enabling \u201cFraud warning\u201d for Safari would show the user a warning if he\/she tries to access fraudulent or compromised websites. The user can then choose whether to proceed to the website or not even if he\/she scans a malicious code by mistake.<\/span><\/p>\n<p><b><\/b><span class=\"s1\"><b>Separate work container for BYOD<\/b><\/span><\/p>\n<p><span class=\"s1\">For personal devices enrolled with Hexnode, there is a separate container for the managed work apps in Android and iOS devices. Even if the user gets attacked and the personal data gets compromised, the work apps and data would remain safe from the attack.<\/span><\/p>\n<p><span class=\"s1\"><b>Business Container for iOS<\/b><\/span><\/p>\n<p><span class=\"s1\">The business container for iOS devices controls the flow of corporate data between managed and unmanaged apps. The admin can configure restrictions to prevent the files downloaded from unmanaged apps in a managed app. This reduces the attack window for QR code attacks targeting managed apps.<\/span><\/p>\n<p><span class=\"s1\"><b>Work Profile for Android devices<\/b><\/span><\/p>\n<p><span class=\"s1\">For <a href=\"https:\/\/www.hexnode.com\/blogs\/implementing-successful-byod-policy-covid-19\/?utm_source=hexnode_blog_qr_codes_enterprise_security&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener noreferrer\">BYOD Android devices<\/a>, enrolling the device as a Profile Owner with the Android Enterprise program in Hexnode creates an isolated work container that separates the work apps and data from personal apps and data. The work apps and data would be compromised only if the user scans a malicious code using a work app. If such an event occurs, the admin can remotely wipe the work profile from the Hexnode Web console.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><b>To sum up<\/b><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">QR code attacks are not large-scale attacks, but these attacks can be very harmful to an organization. A legitimate QR code in itself cannot be hacked, however, there are many ways in which the user can be tricked to scan a malicious one. With QR codes becoming exceeding popular in our mobile society, it is important to take a look at all the possible threats and take proper steps for prevention.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Response (QR) codes have always been popular, ever since it was first introduced in&#8230;<\/p>\n","protected":false},"author":24,"featured_media":7019,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[263],"tags":[5024,5030],"class_list":["post-6489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-deep-dives","tag-cyber-threats","tag-endpoint-security","tab_group-immersive-reads"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why QR codes might be the weakest link in your enterprise security<\/title>\n<meta name=\"description\" content=\"QR codes are everywhere. We scan QR codes for bill payments, to access websites, etc. Check if QR codes are the weakest link in your enterprise security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why QR codes might be the weakest link in your enterprise security\" \/>\n<meta property=\"og:description\" content=\"QR codes are everywhere. We scan QR codes for bill payments, to access websites, etc. Check if QR codes are the weakest link in your enterprise security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Hexnode Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-18T03:22:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-16T02:38:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/23144726\/Blog-Images-Why-QR-codes-might-be-the-weakest-link-in-your-Enterprise-Security-cover-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1340\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Brown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Brown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/\",\"name\":\"Why QR codes might be the weakest link in your enterprise security\",\"isPartOf\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Blog-Images-Why-QR-codes-might-be-the-weakest-link-in-your-Enterprise-Security-cover-image.jpg?format=webp\",\"datePublished\":\"2020-11-18T03:22:28+00:00\",\"dateModified\":\"2022-09-16T02:38:35+00:00\",\"author\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d\"},\"description\":\"QR codes are everywhere. We scan QR codes for bill payments, to access websites, etc. Check if QR codes are the weakest link in your enterprise security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#primaryimage\",\"url\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Blog-Images-Why-QR-codes-might-be-the-weakest-link-in-your-Enterprise-Security-cover-image.jpg?format=webp\",\"contentUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Blog-Images-Why-QR-codes-might-be-the-weakest-link-in-your-Enterprise-Security-cover-image.jpg?format=webp\",\"width\":1340,\"height\":720,\"caption\":\"Why QR codes might be the weakest link in your Enterprise Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hexnode.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why QR codes might be the weakest link in your enterprise security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/\",\"name\":\"Hexnode Blogs\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d\",\"name\":\"Emily Brown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g\",\"caption\":\"Emily Brown\"},\"description\":\"Reading is therapy and writing is healing...sincerely, a cool nerd.\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/author\/anaswara\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why QR codes might be the weakest link in your enterprise security","description":"QR codes are everywhere. We scan QR codes for bill payments, to access websites, etc. Check if QR codes are the weakest link in your enterprise security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/","og_locale":"en_US","og_type":"article","og_title":"Why QR codes might be the weakest link in your enterprise security","og_description":"QR codes are everywhere. We scan QR codes for bill payments, to access websites, etc. Check if QR codes are the weakest link in your enterprise security.","og_url":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/","og_site_name":"Hexnode Blogs","article_published_time":"2020-11-18T03:22:28+00:00","article_modified_time":"2022-09-16T02:38:35+00:00","og_image":[{"width":1340,"height":720,"url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/23144726\/Blog-Images-Why-QR-codes-might-be-the-weakest-link-in-your-Enterprise-Security-cover-image.jpg","type":"image\/jpeg"}],"author":"Emily Brown","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emily Brown","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/","url":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/","name":"Why QR codes might be the weakest link in your enterprise security","isPartOf":{"@id":"https:\/\/www.hexnode.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#primaryimage"},"image":{"@id":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Blog-Images-Why-QR-codes-might-be-the-weakest-link-in-your-Enterprise-Security-cover-image.jpg?format=webp","datePublished":"2020-11-18T03:22:28+00:00","dateModified":"2022-09-16T02:38:35+00:00","author":{"@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d"},"description":"QR codes are everywhere. We scan QR codes for bill payments, to access websites, etc. Check if QR codes are the weakest link in your enterprise security.","breadcrumb":{"@id":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#primaryimage","url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Blog-Images-Why-QR-codes-might-be-the-weakest-link-in-your-Enterprise-Security-cover-image.jpg?format=webp","contentUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/11\/Blog-Images-Why-QR-codes-might-be-the-weakest-link-in-your-Enterprise-Security-cover-image.jpg?format=webp","width":1340,"height":720,"caption":"Why QR codes might be the weakest link in your Enterprise Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hexnode.com\/blogs\/why-qr-codes-might-be-the-weakest-link-in-your-enterprise-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hexnode.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Why QR codes might be the weakest link in your enterprise security"}]},{"@type":"WebSite","@id":"https:\/\/www.hexnode.com\/blogs\/#website","url":"https:\/\/www.hexnode.com\/blogs\/","name":"Hexnode Blogs","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/315e8095e4e7138b7c2ac368b6a41c1d","name":"Emily Brown","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2eef116ae82476e6a416482dedf2276ed8be907f771b16c0858e020d524e507?s=96&d=mm&r=g","caption":"Emily Brown"},"description":"Reading is therapy and writing is healing...sincerely, a cool nerd.","url":"https:\/\/www.hexnode.com\/blogs\/author\/anaswara\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/comments?post=6489"}],"version-history":[{"count":11,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6489\/revisions"}],"predecessor-version":[{"id":21458,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6489\/revisions\/21458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media\/7019"}],"wp:attachment":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media?parent=6489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/categories?post=6489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/tags?post=6489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}