Before the pandemic nearly no one had heard of Zoom, but following a stellar take up of the service there is hardly anyone online who has not used it. This makes it a perfect target for hackers:
Be Careful With Fake Zoom Client Downloads – SANS Internet Storm Center
Your Takeaway
You have to exert some control and monitoring over the device you own and are used for your organisation’s operations. Fake apps can cause chaos.
For some starter help look here:
Then what happens when an employee wants to use their own iPhone?
Clive Catton MSc (Cyber Security) – by-line and other articles