#BeAware: Tailgating und Piggybacking

16. July 2019

Tailgating, also known as Piggybacking, is no trendy new sport, although the name might suggest otherwise. The term refers to a security risk many companies are facing.

Tailgating describes the attempt of an attacker to gain access to restricted areas in a company building by inconspicuously tagging along after authorized persons or groups. The attacker counts on people’s courtesy and politeness and most of all their desire to avoid conflict. After all, no one wants to slam the door in somebody’s face or likes to ask uncomfortable questions.

If you witness a Tailgating attempt oder if an unfamiliar person tries to follow you into a restricted area, here are a couple of suggestions on how to handle the situation:

  • Accompany: „Excuse me. It seems like you did not receive a visitor’s badge. Please let me accompany you to our front desk, so they can issue one for you.“
  • Address: „Excuse me. I cannot see your visitor’s badge or employee ID. Could you please make sure to wear it in a visible spot?“
  • Inform: If you are not sure what to do in any situation, you can always inform your colleagues, the front desk or security personnel.

About #BeAware:
We all know them from our daily work: security tips, the latest virus reports, horror stories from the world of cyber security. With #BeAware, usd security awareness experts would like to help you understand these messages. The articles highlight relevant IT security issues and the most common methods used by hackers and criminals, and give tips on what anyone can do to protect themselves and their company. For more security.

Also interesting:

PCI DSS v4.0: INFI Worksheet Discontinued

PCI DSS v4.0: INFI Worksheet Discontinued

The Payment Card Industry Security Standards Council (PCI SSC) announced it is discontinuing the Items Noted for Improvement (INFI) Worksheet. INFI, a template for documenting items for improvement, had been introduced with PCI DSS v4.0. Effective immediately, QSAs...

The Surprising Complexity of Finding Known Vulnerabilities

The Surprising Complexity of Finding Known Vulnerabilities

IT security professionals need an efficient and reliable solution for identifying known vulnerabilities in a software product, given its name and version. Our colleagues at usd HeroLab place high demands on such a solution. They evaluated several available solutions...

Categories

Categories