Tailgating is a serious vulnerability in any enterprise, with significant physical security and cybersecurity implications. This article explores how technology and security policy can go hand-in-hand to solve both the symptom and the root cause behind tailgating.
Organizations invest heavily in electronic access control systems to let the right people in and keep the wrong people out. However, tailgating and piggybacking incidents chip away at this investment, potentially at great cost including stolen assets (physical and data), physical threats to building occupants and damage to the organization’s reputation.
Tailgating and piggybacking are words often used interchangeably, but there is a nuanced difference between the two. When it comes to tailgating, an authorized person badges in and someone else follows that authorized person through a door (or gate) without the knowledge of the first individual. In other words, the authorized person is not aware that someone has followed them in. Piggybacking is when the authorized individual voluntarily holds the door open for someone else. For the sake of simplicity in this article, we will use the term “tailgating” for both.
Tailgating is one of the biggest physical security risks that security operations teams face. In a recent survey, 48% of respondents said that they had experienced a tailgating violation. In a similar study, a startling 70 percent believed that it was ‘somewhat likely’ to ‘very likely’ a security breach could happen at their own facility as the result of a tailgating incident. In fact, the risk extends to cybersecurity as well; one could easily gain access to corporate computer networks by making an unauthorized entry through tailgating. This could lead to massive breaches like what occurred at NASA JPL. And while it is not discussed as frequently, vehicle tailgating at access-controlled perimeter gates poses a significant threat to a site’s security as well.