Holding open a door for someone seems like a thoughtful and inconsequential event, but for some businesses, it can pose a serious security risk. A tailgating attack can create safety, financial, and reputational concerns for an organization, all without anyone realizing that it’s happening.
The good news is that your organization can take steps to make tailgating more difficult and less appealing to bad actors. With the right combination of technology and proactive strategies, you can prevent unauthorized individuals from entering your spaces. The first step to finding those solutions is understanding the fundamentals of what tailgating is and how it happens.
In this article, you’ll learn everything you need to know about tailgating attacks and what you can do to stop them.
What is tailgating? #
The word tailgating has long been used to describe a driver who follows another car too closely, but it has a separate meaning in the world of business security. Tailgating in that context refers to someone who closely follows another person to enter a building without using a key or authorization credentials. While this kind of tailgating doesn’t cause car accidents, it’s dangerous in its own way.
Types of tailgating #
Instances of tailgating don’t always look the same or pose the same level of risk for a business. Generally speaking, they fall into one of these categories:
- Malicious tailgating: Tailgating is malicious if a person knowingly exploits another person to enter a space they don’t have authorization to access. They usually do so to carry out questionable or illegal activity, such as property theft.
- Virtual tailgating: Tailgating can also occur in digital spaces if someone uses another person’s access credentials or network vulnerabilities to access confidential information. These attacks sometimes occur in tandem with malicious tailgating.
- Accidental tailgating: Many people tailgate without ill intentions, often because they forgot their key or ID card, have their hands full, or simply find it more convenient not to have to unlock a door. However, to minimize incidences of tailgating and keep your property secure, it’s best to make a general policy against tailgating and require every employee to scan their own credentials when entering your premises.
Understanding what types of tailgating your business is most likely to experience can help you set up the necessary safeguards to protect your employees, property, and data.
Distinguishing between tailgating and piggybacking #
Tailgating and piggybacking are closely related practices, so the terms are often used interchangeably. They both refer to individuals who follow someone else through a security checkpoint, but the method is slightly different.
In tailgating, the individual with access authorization is unaware that someone else is trying to enter. After they unlock the door, the tailgater sneaks in behind them. A person who is attempting to piggyback doesn’t try to hide their presence. Instead, they might strike up a conversation with the person entering to distract them or claim to be a delivery person who is dropping off a package.
Malicious tailgating and piggybacking are a form of social engineering where the attacker manipulates the target through deception or coercion. Through devious methods, they convince someone to take a seemingly harmless action—opening or holding the door—that could actually cause significant damage to the organization.
Although there are slight distinctions between them, both piggybacking and tailgating are a threat to businesses. Some video surveillance and access control solutions like Kisi effectively reduce the risk and give greater insight into who is entering your premises.
