• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity  /  Tailgating: Security Risks Involved
Tailgating: Security Risks Involved
27 July 2018

Tailgating: Security Risks Involved

Written by Seqrite
Seqrite
Cybersecurity
4
Shares

It is a common scenario. An employee swipes his identity card and enters his office premises. He spots someone without an id card outside the gates, wanting to get in. He wants to help – he offers them entry by swiping in his own card and goes on his way, happy in the knowledge that he has done something good.

Or let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.

Unauthorized entry

The scenario we are talking about is tailgating and it is one of the most common security problems in any office everywhere in the world. And it doesn’t just pose a physical security risk. Think of it this way, tailgating allows any unauthorized person to enter the company’s premises. The amount of harm they can do is immense. They can go in and steal confidential information. They can steal client data. In cybersecurity, one of the most common issues is insider threat and tailgating is one of those ways in which an insider can access a department which he may not be authorized to and steal data from there.

A recent survey estimated that the cost of a security breach caused by tailgating could range from $150,000 to “too high to measure”. While 70% of the respondents of the survey believed their or their businesses were vulnerable to security breaches from tailgating, only 15% said they were tracking tailgating incidents regularly. The last statistic indicates the issue – this is a common issue which happens everywhere but most security administrators don’t know how to deal with it.

The social factor

The reason could be social. While any form of security strongly emphasizes access control, that clashes with typical human behavior and courtesy. For most people, holding a door open for a colleague is just normal good behavior – on the flip side, shutting a door closed on someone else’s face or asking for someone’s credentials before letting them in is bound to feel uncomfortable and rude. Individuals hence just follow what the social cues they have grown up, allowing tailgating and hence defeating the sole purpose of access control.

To restrict tailgating, it is important for administrators to take recourse to both hardware and social engineering solutions. A few hardware solutions which can be put in place are:

  • Electronic Turnstiles which serve as a physical barrier. They can be effective but also expensive. This solution may also give off the impression of a “closed office” which administrators may want to avoid
  • Revolving Doors which only allow access to one person. These can be highly effective but are large and expensive to maintain. They also lead to bottlenecks leading to resentment and anger among the workforce.
  • Retinal or Iris Scans can be extremely effective but require high degree of technical knowledge. These can be used for high security areas.

However, social engineering can go a long way through these steps:

  • Awareness Campaigns which educate employees about the perils of tailgating, the security risks involved and why you should prevent tailgating on a regular basis is important to spread awareness about this practice
  • Compliance can be enforced by creating a stringent Access Control policy and ensuring all employees adhere to it. Those who do not comply will run the risk of disciplinary measures that may even include loss of employment

Ultimately, for workspace security, it is important to keep tailgating at a minimum through a judicious mix of both hardware and social engineering solutions. While awareness campaigns educate employees, physical solutions will actually enforce anti-tailgating and help enterprises keep their data secure and safe.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostThe evolution of a 4-year-old-threat Emotet: From an infamous Tro...
Next Post  POS security vulnerabilities for retail industry
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies