Tailgating and piggybacking are low-tech tactics used by malicious actors to enter secure areas. They occur when an unauthorized person gains physical access to a location with sensitive information or vulnerable IT equipment. These intrusions can have significant financial and reputational impacts on businesses, so it is essential for companies to take measures to prevent these events.
Tailgating and Piggybacking Explained
Tailgating can occur when an intruder sneaks into a secure area by following an authorized employee. On the other hand, piggybacking is a type of social engineering technique that occurs when an intruder tricks an authorized individual into letting them into a secure area.
Once inside, the perpetrator can steal or view sensitive data, upload malware, take property or damage devices. Tailgating and piggybacking can lead to significant data breaches that create compliance violations and reputational damage, erode the trust of vendors and clients, and lead to costly fines and penalties. The following are examples of how these intrusions can occur:
Tips on Preventing Tailgating and Piggybacking
As part of a comprehensive approach to cybersecurity, businesses should implement measures to prevent tailgating and piggybacking. Consider the following strategies:
Taking steps to understand and prevent these tactics can help reduce the risk of them occurring and offer financial and reputational protection. For more information, contact us today.
Article Published By: Zywave, Inc.