{"id":2882,"date":"2023-09-13T12:00:43","date_gmt":"2023-09-13T10:00:43","guid":{"rendered":"https:\/\/www.hwgsababa.com\/?p=2882"},"modified":"2025-10-22T12:32:26","modified_gmt":"2025-10-22T10:32:26","slug":"what-are-tailgating-and-piggybacking","status":"publish","type":"post","link":"https:\/\/www.hwgsababa.com\/en\/what-are-tailgating-and-piggybacking\/","title":{"rendered":"What are Tailgating and Piggybacking?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row el_class=&#8221;margin_top_100&#8243;][vc_column][vc_single_image image=&#8221;3157&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_30&#8243;][vc_column][vc_column_text el_class=&#8221;paragrafo testo_articolo&#8221;]\n<h3><strong>Tailgating and Piggybacking<\/strong> are two social engineering practices. They exploit the human factor to violate areas reserved for authorized personnel. It brings consequent risk for security of both physical and information systems.<\/h3>\n<p>Let us find out what exactly we are talking about, and understand how these scenarios are applicable to both physical and IT security. There is a subtle difference between the meaning of Tailgating and Piggybacking.<\/p>\n<p><span style=\"color: #0087cc\"><strong>Tailgating<\/strong><\/span>\u00a0represents the situation, when an individual without access authorization closely follows an authorized person in a reserved area. The malefactor takes advantage of the moment, when the authorized one opens the door with his badge \u2013 and sneaks inside before the door closes.<\/p>\n<p><span style=\"color: #0087cc\"><strong>Piggybacking<\/strong><\/span>\u00a0represents the situation, when someone accesses a reserved area with the permission obtained by deception of an authorized person.<\/p>\n<h3><span style=\"color: #c70973\"><strong>How do Tailgating and Piggybacking happen in practice?<\/strong><\/span><\/h3>\n<p>If you watched the film with Leonardo DiCaprio \u201cCatch me if you can\u201d, you would remember the smart character of the famous swindler Frank Abagnale he played. The fraudster entered restricted areas in airports and hospitals by pretending a doctor or an airplane pilot. He succeeded through deception and cunning, causing financial damage to the companies he cheated.<\/p>\n<p>Such criminals pose a serious problem for companies, as they violate the law, often with criminal intent. Those who aim to gain access without authorization, can be well-dressed and introduce themselves as customers to fool the security personnel. Or they can appear dressed as couriers, carrying bulky parcels, asking someone from the staff outside to open the entrance door with a company badge.<\/p>\n<p>Sad but true, that people\u2019s kindness and ingenuity often helps fraudsters. They manage to access restricted areas, exposing corporate assets and confidential data at risk. Anyone who attempts to get an unauthorized access is aware of these \u201cweaknesses\u201d and uses them to get what he wants.<\/p>\n<p>Would you let someone you do not know enter your home? Even if he asked you kindly and good manners? You would probably think twice before doing it, as it can pose a safety risk to yourself and your beloved.<\/p>\n<h3><span style=\"color: #c70973\"><strong>What can you do to protect the corporate space against Tailgating and Piggybacking?<\/strong><\/span><\/h3>\n<p>The same attitude is valid for the safety of your workplace. If you notice a stranger without a badge in your company, you need to follow some security procedures. Most companies have security policies describing access rules to reserved spaces. If you have never heard of them, ask to put them into practice.<\/p>\n<ul>\n<li>Do not allow someone you do not recognize as a colleague to access the areas reserved for company staff with you (tailgating). If the door has a lock, let him open it<\/li>\n<li>When you notice someone you do not know inside your office, check if he has a visitor badge<\/li>\n<li>If you notice someone suspicious, but you cannot ask him about his reasons to be there, immediately contact the security staff. They are exactly there for such events<\/li>\n<\/ul>\n<p>The situation can be more complicated when it comes to coworking spaces. There are many employees from different companies, who come and go, and do not know each other. Intruders can use multiple tricks to get inside the restricted areas.<\/p>\n<h3><span style=\"color: #c70973\"><strong>IT piggybacking<\/strong><\/span><\/h3>\n<p>Unfortunately, tailgating and piggybacking happen <a href=\"https:\/\/www.mitre.org\/sites\/default\/files\/publications\/uninvited_guest.pdf\" rel=\"noopener\">more often<\/a>, than one can think. There are numerous violations of information systems caused by employees\u2019 negligence and naivety. They forget to lock their screens, or leave their access credentials written on a post-it next to the monitor. Those who enter inside the reserved areas without authorization with very specific purposes will certainly notice that.<\/p>\n<p>Please, follow the corporate security policies:<\/p>\n<ul>\n<li>Remember to lock your laptop or desktop, when you move away from the workplace. Turn it off in the end of the day<\/li>\n<li>Protect access to your workstation with a complex password. Do not share it with anyone, even if you receive a call from an IT technician who needs your password to \u201cdo things\u201d. No technician would ever ask your password<\/li>\n<li>Keep your workplace tidy and do not leave paper and non-paper corporate documents unattended<\/li>\n<li>Keep all confidential documents safe in locked compartments<\/li>\n<li>Destroy documents with appropriate devices when they are no longer needed<\/li>\n<\/ul>\n<p>You can find this and other important information in\u00a0\u00a0<strong><a href=\"https:\/\/www.hwgsababa.com\/en\/audit-offensive-and-governance\/\">training platform<\/a><\/strong>, which allows employees to increase their skills to resist cyber-attacks and social engineering techniques, such as those indicated in this article.[\/vc_column_text][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;margin_top_100&#8243;][vc_column][vc_single_image image=&#8221;3157&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_30&#8243;][vc_column][vc_column_text el_class=&#8221;paragrafo testo_articolo&#8221;] Tailgating and Piggybacking are two social engineering practices. They exploit the human factor to violate areas reserved for authorized personnel. It brings consequent risk for security of both physical and information systems. Let us find out what exactly we are talking about, and understand how these scenarios are applicable&hellip;<\/p>\n","protected":false},"author":3,"featured_media":2885,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[17],"post_series":[],"class_list":["post-2882","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-security-awareness","entry","has-media"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/posts\/2882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/comments?post=2882"}],"version-history":[{"count":12,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/posts\/2882\/revisions"}],"predecessor-version":[{"id":269494,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/posts\/2882\/revisions\/269494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/media\/2885"}],"wp:attachment":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/media?parent=2882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/categories?post=2882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/tags?post=2882"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/post_series?post=2882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}