Attackers recently used social engineering to convince mobile device users to hand over their International Mobile Equipment Identity (IMEI) numbers. I'm assuming this should never be used as an authentication factor, correct? Is it good practice to advise users/customers to never give out their IMEI numbers?
Ask the expert!
Randall Gamby, SearchSecurity.com's resident expert on identity management and access control, is standing by to answer your toughest enterprise IAM questions. Send in your questions today! (All questions are anonymous.)
There are two reasons why an organization wouldn’t use an International Mobile Equipment Identity (IMEI) when considering possible mobile authenticators. The first is that if the IMEI authentication number is compromised, which is possible using special tools, the IMEI can be easily ported to a stolen telephone that allows the rogue telephone operator to take advantage of the services the original device had access to, such as SMS authentication codes.
More importantly, an IMEI is tied to a device, not an individual. If a user loses his or her unlocked telephone but doesn’t report it, anyone who picks up the telephone can use its applications. Identities should be technology-neutral, not tied to a device.
To answer the second question, users and/or customers should never give out their IMEI numbers, or any other mobile-identifying information, unless the individual has initiated a call with his or her provider.
Dig deeper on Active Directory and LDAP Security
Related Q&A from Randall Gamby, Contributor
Is your remote desktop access software really secure? Randall Gamby offers advice for conducting a remote access audit to validate security.continue reading
Expert Randall Gamby discusses risk-based authentication, and whether that type of user identification system is right for the enterprise.continue reading
Expert Randall Gamby discusses various types of single sign-on, specifically the approaches of Ping Identity's SSO and Symplified SSO.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.