• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  Tailgating: Security Risks Involved
unauthorized entry
27 July 2018

Tailgating: Security Risks Involved

Written by Seqrite
Seqrite
Uncategorized
  • 4
    Shares
Estimated reading time: 3 minutes

It is a common scenario. An employee swipes his identity card and enters his office premises. He spots someone without an id card outside the gates, wanting to get in. He wants to help – he offers them entry by swiping in his own card and goes on his way, happy in the knowledge that he has done something good.

Or let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.

Unauthorized entry

The scenario we are talking about is tailgating and it is one of the most common security problems in any office everywhere in the world. And it doesn’t just pose a physical security risk. Think of it this way, tailgating allows any unauthorized person to enter the company’s premises. The amount of harm they can do is immense. They can go in and steal confidential information. They can steal client data. In cybersecurity, one of the most common issues is insider threat and tailgating is one of those ways in which an insider can access a department which he may not be authorized to and steal data from there.

A recent survey estimated that the cost of a security breach caused by tailgating could range from $150,000 to “too high to measure”. While 70% of the respondents of the survey believed their or their businesses were vulnerable to security breaches from tailgating, only 15% said they were tracking tailgating incidents regularly. The last statistic indicates the issue – this is a common issue which happens everywhere but most security administrators don’t know how to deal with it.

The social factor

The reason could be social. While any form of security strongly emphasizes access control, that clashes with typical human behavior and courtesy. For most people, holding a door open for a colleague is just normal good behavior – on the flip side, shutting a door closed on someone else’s face or asking for someone’s credentials before letting them in is bound to feel uncomfortable and rude. Individuals hence just follow what the social cues they have grown up, allowing tailgating and hence defeating the sole purpose of access control.

To restrict tailgating, it is important for administrators to take recourse to both hardware and social engineering solutions. A few hardware solutions which can be put in place are:

  • Electronic Turnstiles which serve as a physical barrier. They can be effective but also expensive. This solution may also give off the impression of a “closed office” which administrators may want to avoid
  • Revolving Doors which only allow access to one person. These can be highly effective but are large and expensive to maintain. They also lead to bottlenecks leading to resentment and anger among the workforce.
  • Retinal or Iris Scans can be extremely effective but require high degree of technical knowledge. These can be used for high security areas.

However, social engineering can go a long way through these steps:

  • Awareness Campaigns which educate employees about the perils of tailgating, the security risks involved and why you should prevent tailgating on a regular basis is important to spread awareness about this practice
  • Compliance can be enforced by creating a stringent Access Control policy and ensuring all employees adhere to it. Those who do not comply will run the risk of disciplinary measures that may even include loss of employment

Ultimately, for a secure workplace, it is important to keep tailgating at a minimum through a judicious mix of both hardware and social engineering solutions. While awareness campaigns educate employees, physical solutions will actually enforce anti-tailgating and help enterprises keep their data secure and safe.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostThe evolution of a 4-year-old-threat Emotet: From an infamous Tro...
Next Post  POS security vulnerabilities for retail industry
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Gorgon APT fractures India’s Industrial Backbone

    Gorgon APT targeting MSME sector in India

    August 10, 2020
  • Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

    May 21, 2020
  • The-need-for-businesses-to-empower-the-CISO

    Why do boards need to empower their CISO?

    October 22, 2019

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond Turn the Page: Cybersecurity Predictions for 2021 & beyond February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.