Near Field Communications (NFC)

24th March 2020 | Cybrary Near Field Communications (NFC)


Near Field Communications (NFC) is a short-range wireless technology that enables simple and secure communication between electronic devices. It may be used on its own or in combination with other wireless technologies, such as Bluetooth. The communication range of NFC is between 5 and 10 centimeters, allowing devices in close proximity of each other to communicate and share data. This makes NFC ideal for secure transactions, such as contactless payments at a checkout counter. NFC is being used by Android OS devices, allowing them to connect to certain devices very easily, and to transfer data (photos, videos, document, etc) to someone easily. This is very similar to the AirDrop feature on Apple OS devices, where it can transfer data to someone else in the vicinity in seconds by using a combination of Wi-Fi and bluetooth to connect to another Apple OS device. NFC is commonly used in other places as well such as, paying a fare on public transit, checking in and checking out at a hotel, loading information about an artist or piece of art at a museum, or to unlock an NFC-enabled door lock. 

Source: TechTerms

Additional Reading: Hackers May Exploit Android NFC Beaming Vulnerability To Deliver Malware

What is NFC? Everything you need to know

Related Term: Radio Frequency Identification (RFID)

What does this mean for an SMB?

Near field communication chips are increasingly being used inside authentication devices. While physical badge access devices for building access are still dominated by RFID (Radio Frequency Identifier) technologies, computer based authentication mechanisms are on the market from vendors like Yubico’s NFC enabled authentication token. This is a great way to add a second factor to your authentication mechanisms for your smart phone or desktop computer/laptop.

To learn more about Near Field Communications, watch this short 3 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Safe AI Adoption: Five Rules Every Business Must Follow

Safe AI Adoption: Five Rules Every Business Must Follow

Artificial Intelligence (AI) tools are entering our businesses like a new intern with great ideas but no...

Read more
From Fear to Feedback: Report Phishing Channel Works Wonders

From Fear to Feedback: Report Phishing Channel Works Wonders

CyberHoot believes security awareness should feel positive, empowering, and rewarding. Traditional phishing...

Read more
Why Security Culture is Critical — And How CyberHoot Makes It Stick

Why Security Culture is Critical — And How CyberHoot Makes It Stick

In today’s cybersecurity landscape, breaches are rarely caused by a lack of technology. Instead, they stem from...

Read more