Securing mobile devices that access the corporate network is hard enough, but now I'm reading about all of the security holes with the near field communication (NFC) technology that is built in to many of these newer devices. Are there any methods enterprises can use to secure NFC in mobile devices? Should we just consider banning such devices in BYOD security policies?
Ask the expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Charlie Miller's security research for Accuvant Labs details the many vulnerabilities he found in NFC implementations. These vulnerabilities allowed him to access photos, send text messages, make calls and browse the Internet. If an attacker is able to force access to the Internet over NFC, they could potentially root the phone. The security risk from NFC attacks could be minimized by using an app that only enables the feature for a short period when its use is absolutely necessary. Keeping mobile devices updated with the most recent patches also helps reduce any NFC security risks, but, of course, this depends on the wireless carrier ecosystem used to deploy the patches.
In most environments, banning any device as a part of a BYOD policy would be impossible to do consistently. If a company has the sufficient resources and enough control to search everyone who enters your buildings or check the configuration of all devices connecting to your systems or network, it might be possible.
Many enterprises have fretted over any new wireless technology that they don't think they can fully control, including WiFi, Bluetooth, RFID and now NFC. Enterprise fears over wireless security even created a market for anti-WiFi paint, so special phone cases that block NFC are probably the next cell phone accessory to be marketed along with RFID blockers. For some enterprises, security concerns over NFC technology are legitimate, but for the majority of enterprises that don't have such stringent security requirements, worrying about NFC may not be a good use of information security resources.
Dig Deeper on BYOD and mobile device security best practices
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.