Menu
Chat
Get Started

Main Menu

Utility Menu

Call Today

(866) 495-0423
Main Line
(866) 739-8324
US Support
(855) 812-5191
Canada Support

How Secure Are NFC Payments?

Woman making NFC payment at food truckShort for “near field communication”, NFC allows devices in close proximity to wirelessly transfer data back and forth. The technology is very similar to Bluetooth, but NFC uses far less power and works over much shorter distances.

In the world of commerce, merchants and consumers use NFC technology to initiate contactless payments via credit cards or mobile devices. Rather than physically dip or swipe plastic, consumers simply wave their smartphone or card across an NFC reader to authorize transactions.

NFC payment technology already comes standard with most Android and iOS devices and a growing number of credit and debit cards. Contactless payments have become more mainstream, with a growing number of retailers and restaurants adding their own in-store NFC readers — including Target, Macy's, McDonald's and Walgreens.

But if one only needs to wave a mobile phone (or credit card) to authorize a transaction, how secure is NFC payment technology? After all, couldn't a nearby hacker wirelessly steal users’ payment information? 

Learn More About Mobile NFC Payments

The Truth about NFC Payment Security

NFC technology comes with a range of security features that help protect financial data from prying eyes, including:

1. Proximity Protection

Contactless payment solutions work over incredibly short distances (we're talking about inches, not yards). In order for a would-be thief to potentially steal information, he or she would have to stand uncomfortably close to an NFC-enabled device. This proximity protection represents the first level of defense. 

2. User Initiation

In order to begin each transaction, the customer must actively initiate the contactless payment process. This usually requires launching the appropriate NFC application within the phone in order to establish a connection between the device and the merchant's reader. So even if a thief gets close enough, no transactions can happen in standby mode. 

With some NFC applications, the user must also verify a transaction by using fingerprint scanning technology or a private pass code.

3. Secure Element Validation

Once a connection has been established, the transaction only goes through after the card or mobile device has validated the purchase using a secure element chip. This validation process assigns a unique digital signature to every payment instead of transferring credit or debit card numbers between the device and reader.

Secure element verification is similar to the validation process more commonly associated with chip-enabled EMV credit cards.

NFC Payments Are Secure — But Are They Foolproof?

With three separate levels of protection, NFC technology represents one of the most secure payment options in the world. But no payment technology is 100 percent foolproof — not even cash.

However, there are steps you can take to protect private financial data from hackers:

  • As a consumer, you should password-protect your mobile device at all times. If your smartphone falls into the wrong hands, you won’t always be able to prevent thieves from initiating payments in your absence. 
  • As a merchant, you can make your payment infrastructure more secure by ensuring that your credit card processing remains PCI-compliant and follows the latest industry guidelines. 

Have additional questions about NFC payment security? 

Get a free consultation today!

Topics: Mobile Payments, Payment Technology, PCI Compliance and Fraud Prevention, Small Business Tips, Payment Trends, Consumer Education

Subscribe to Weekly Email Digests

Welcome to the BluePay Blog!

Whether you're a small business, an enterprise corporation, a financial institution, or a software partner, we have created a series of blog posts to help you and your customers, learn more about the complex nature of payments. Take a look to learn how payments can help to simplify your business operation, and may even help to grow your revenue.

Let us show you around:

  • Subscribe to the blog and receive weekly blog digests in your inbox.
  • Looking for more info on a specific topic? Click one of the topics below.
  • Follow us on Twitter to catch our newest blog posts. 

Recent Posts