Physical social engineering threats are a type of attack that exploits human psychology to gain unauthorized access to a secure area or system. Two common types of physical social engineering threats are tailgating and piggybacking. These threats occur when an attacker follows an authorized individual into a secure area, often without the authorized individual's knowledge or consent.
What is Tailgating?
Tailgating is a type of physical social engineering threat where an attacker follows an authorized individual into a secure area without using their own authentication credentials. This can occur when an employee or authorized individual is entering a building, room, or other secure area and an attacker quickly follows behind them before the door can close. Tailgating can be done in person or through the use of technology, such as using a fake ID badge to gain access to a secure area.
What is Piggybacking?
Piggybacking is a type of physical social engineering threat that is similar to tailgating. However, in piggybacking, the attacker asks the authorized individual to hold the door open for them, often under the guise of being a new employee or having forgotten their ID badge. This can be done in a way that is friendly and non-threatening, making it more difficult for the authorized individual to suspect that anything is amiss.
How Tailgating and Piggybacking Occur
Tailgating and piggybacking can occur in a variety of ways, including:
- Following an employee into a building or secure area
- Using a fake ID badge to gain access to a secure area
- Asking an employee to hold the door open for them
- Pretending to be a new employee or having forgotten their ID badge
- Using social engineering tactics, such as creating a distraction or pretending to be in a hurry, to gain access to a secure area
Consequences of Tailgating and Piggybacking
The consequences of tailgating and piggybacking can be severe, including:
- Unauthorized access to sensitive information or systems
- Theft of equipment or assets
- Damage to property or equipment
- Disruption of business operations
- Compromise of security protocols and procedures
Preventing Tailgating and Piggybacking
Preventing tailgating and piggybacking requires a combination of technical and non-technical measures, including:
- Implementing access control systems, such as ID badges and biometric authentication
- Educating employees on the risks of tailgating and piggybacking and the importance of security protocols
- Conducting regular security audits and risk assessments
- Implementing physical security measures, such as cameras and alarms
- Encouraging employees to report suspicious behavior or individuals
Technical Measures to Prevent Tailgating and Piggybacking
Technical measures can be implemented to prevent tailgating and piggybacking, including:
- Access control systems that use ID badges, biometric authentication, or other forms of authentication
- Intrusion detection systems that can detect and alert on potential security threats
- Video surveillance systems that can monitor and record activity in secure areas
- Alarm systems that can alert on potential security threats
- Secure door systems that can detect and prevent tailgating and piggybacking
Non-Technical Measures to Prevent Tailgating and Piggybacking
Non-technical measures can also be implemented to prevent tailgating and piggybacking, including:
- Educating employees on the risks of tailgating and piggybacking and the importance of security protocols
- Encouraging employees to report suspicious behavior or individuals
- Implementing a culture of security awareness and vigilance
- Conducting regular security audits and risk assessments
- Implementing physical security measures, such as cameras and alarms
Best Practices for Preventing Tailgating and Piggybacking
Best practices for preventing tailgating and piggybacking include:
- Implementing a multi-layered security approach that includes technical and non-technical measures
- Educating employees on the risks of tailgating and piggybacking and the importance of security protocols
- Conducting regular security audits and risk assessments
- Encouraging employees to report suspicious behavior or individuals
- Implementing physical security measures, such as cameras and alarms
- Continuously monitoring and evaluating security protocols and procedures to ensure they are effective and up-to-date.





