#BeAware: Tailgating und Piggybacking

16. July 2019

Tailgating, also known as Piggybacking, is no trendy new sport, although the name might suggest otherwise. The term refers to a security risk many companies are facing.

Tailgating describes the attempt of an attacker to gain access to restricted areas in a company building by inconspicuously tagging along after authorized persons or groups. The attacker counts on people’s courtesy and politeness and most of all their desire to avoid conflict. After all, no one wants to slam the door in somebody’s face or likes to ask uncomfortable questions.

If you witness a Tailgating attempt oder if an unfamiliar person tries to follow you into a restricted area, here are a couple of suggestions on how to handle the situation:

  • Accompany: „Excuse me. It seems like you did not receive a visitor’s badge. Please let me accompany you to our front desk, so they can issue one for you.“
  • Address: „Excuse me. I cannot see your visitor’s badge or employee ID. Could you please make sure to wear it in a visible spot?“
  • Inform: If you are not sure what to do in any situation, you can always inform your colleagues, the front desk or security personnel.

About #BeAware:
We all know them from our daily work: security tips, the latest virus reports, horror stories from the world of cyber security. With #BeAware, usd security awareness experts would like to help you understand these messages. The articles highlight relevant IT security issues and the most common methods used by hackers and criminals, and give tips on what anyone can do to protect themselves and their company. For more security.

Also interesting:

SWIFT CSCFv2025 - The Three Most Important Questions About the Update

SWIFT CSCFv2025 - The Three Most Important Questions About the Update

Users of the SWIFT network are required to demonstrate compliance with the mandatory security controls through an annual independent audit in accordance with the Customer Security Control Framework (CSCF). As part of this SWIFT Assessment, the security of an...

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings

In the dynamic field of cybersecurity, it is often the obscure and long-forgotten vulnerabilities that pose a hidden threat to otherwise hardened systems. One such vulnerability lies in invalid character encodings that violate the UTF-8 standard. While overlong UTF-8...

Categories

Categories