Most people are aware of the dangers of cybercrime, and do as much as they can to prevent it, from changing passwords to using two-step authentication. But cybercriminals don’t always start with the Internet to access secured information: Sometimes they physically enter offices where sensitive information is kept in order find their way to your network. They do this using a social engineering technique called “piggybacking” or “tailgating.”
How piggybacking happens
- Following right after another employee who has opened a secured door
- Allowing an employee to swipe their keycard while “politely” holding the door open
- Pretending to be on the phone so as to dissuade security personnel and employees from asking for credentials
Watch the video to see how different forms of piggybacking occur.
How we can help
Employers can take steps to prevent piggybacking by giving your whole organization security awareness training helping your whole organization get involved with protecting your security. CLA can help you assess if your organization is vulnerable to threats like piggybacking and develop steps to prevent social engineering breaches.