Your Security is our primary focus

17 Canon Harnett Court

Milton Keynes, MK12 5NF

MON - FRI: 8:30 - 18:00

Helpdesk Opening Hours

+44 (0) 1908 410261

Customer Support

Another day, another phishing scam… and this one could catch anyone off guard.

Have you ever scanned a QR code with your phone? It’s become such a convenient way to access information instantly. But did you know that there’s a new form of phishing out there that’s using QR codes to hide harmful links? It’s called ‘quishing”.

What’s the deal?

QR codes are everywhere nowadays, and we often scan them without thinking twice. They’re on parking meters, in text messages, emails, and even on product packaging. We’ve all just accepted QR codes as harmless tools to access information quickly. But cyber criminals are counting on this trust we have in them.

In a quishing attack, scammers create fake QR codes that look innocent, yet they’re anything but. They can trick you into scanning these codes for various reasons – maybe they claim it’s to reschedule a parcel delivery, confirm account information, or address suspicious activity. The key here is urgency; they want you to act fast without thinking.

Imagine scanning a QR code on a parking meter, thinking it’s just for payment, but instead, it leads you to a malicious site. Scary, right?

So, why is this a big problem? Well, for one, mobile devices are particularly vulnerable to these attacks. Unlike most desktop operating systems, phones often lack built-in phishing protection. And that’s what makes them an easy target for cyber criminals.

How can you protect yourself and your business from this type of attack?

First, avoid scanning QR codes from unknown sources. If you spot a QR code in an unexpected place, take a moment to inspect the URL it leads to. Look for misspellings or odd characters in the URL – these are telltale signs of a scam.

If you receive an unexpected email or text with a QR code urging you to act immediately, don’t scan it. Instead, verify the legitimacy of the sender using a confirmed phone number or website. Legitimate companies will provide clear instructions without asking you to scan a QR code for verification.

And if you receive an email claiming to be from a company but the sender’s email is from Gmail or some random, unknown domain, be suspicious. It could very well be an attack.

Lastly, strengthen your phone and online account security. Keep your phone’s operating system up to date, use strong passwords, and enable multi-factor authentication wherever possible. These simple steps can go a long way in keeping your sensitive business data safe from quishing attacks.

Remember, it’s not just about protecting yourself – it’s also crucial to inform your employees about scams like quishing. Awareness and vigilance are our best defences against these digital tricksters.

#CyberSecurity #Quishing #StaySafeOnline

https://www.zdnet.com/article/quishing-is-the-new-phishing-why-you-need-to-think-before-you-scan-that-qr-code/

it sECURITY & sUPPORT pACKAGES

Standard Package

Entry level IT Support and Security Package

Premium Package

Premium comes packed with essential security and data backup

Elite Package

For the more securty concious business owner.

Ultimate Package

For a total security and centrally managed it environment.

Services

3CX Hosted Phone Systems

3CX hosted phone systems are cloud-based communication platforms that enhance business connectivity through unified voice, video, and messaging tools.

Application Hosting & Management

Application hosting and management involves deploying and maintaining software applications in the cloud to ensure their reliable and secure operation.

Centralised Professional Email Signature

Centrally managed email signatures. Set sleek unified signatures for the whole company.

Dark Web Monitoring

Monitor the Dark Web for compromised domain/emails from your company to limit a cyber attack.

Device Protection (Endpoint Detect & Respond – EDR)

Fully managed and monitored device protection 24/7, human led SOC, who detect and investigate, triage, and action remediation.

DNS Security and Configuration

Email security is paramount to protecting your business and brand. Configuration of a domain for email is the first step.

Domain Registration & DNS Management

Domain registration secures your web address, while DNS management ensures that people can find your website using that address.

Email Filtering, Protection & Security

Total email security that filters spam, viruses, phishing attacks and more.

Full Fibre 900mbps Business Internet

Full Fibre 900Mbps Business Internet delivers lightning-fast, symmetrical speeds to supercharge business productivity.

Google Workspace Subscription, Management & Security

Google Workspace smoothly integrates the business solutions that your team needs in one place.

Internet Filtering & Protection

Our DNS filtering solution has been ranked #1. Internet and Content Filtering at its best.

Managed Backup for Microsoft 365 & Google Workspace

Our backup solution is built in the cloud for the cloud, making it one of the fastest and most reliable cloud backups.

Microsoft 365 Security Monitoring

24/7/365 monitoring of your Microsoft 365 account to spot any configurations issues and fix them.

Microsoft 365 Subscription, Management & Security

Microsoft 365 subscriptions include familiar Office apps, intelligent cloud services, and world-class security in one place.

Network Discovery

Network Discovery provides complete security scans of your network in real time.

Password Manager

Protect your organisation against cyber threats with zero-trust enterprise password management.

Penetration & Vulnerability Testing

Automated full-scale penetration and vulnerability testing as a service.

Phishing Simulation & Security Awareness Training

Auotmate your Cyber Security Awareness & Phishing Training with YCW.

Server Support

24/7/365 Server monitoing in real time. We fully maintain, patch monitor your servers.

Support, Monitoring & Maintenance

Our IT Helpdesk is available from 8:30am to 6:00pm Monday to Friday to answer and resolve any question you may have.

Windows 365 Cloud PC

Windows 365 Cloud PC allows you to securely stream your Windows experience, including your personalised apps, content, and settings, directly from the Microsoft Cloud to any device.

WordPress Hosting

WordPress Hosting is a hosting service optimized for WordPress websites, providing easy setup, enhanced security, and performance tuning for a seamless WordPress experience.

Zoho CRM Subscriptions

Zoho CRM is a cloud-based customer relationship management platform designed to help businesses streamline their sales, marketing, and customer support processes

Learning Centre

Tech Guides

Technical Guides from Your Cloud Works

Blog

Your Cloud Works Tech Blog

Books

Published Books by Your Cloud Works

Newsletters

Tech Insider Newsletters

News

Latest News from Your Cloud Works

Frequently Asked Questions

Frequently Asked Questions by Clients

Tech Tip Videos

Technical Tip Videos from Your Cloud Works