Tailgating in cybersecurity is a physical security breach where an unauthorized person follows an authorized individual into a secured premise. It is a type of social engineering attack that enables hackers to gain access to a password-protected or otherwise off-limits physical location. The attacker may closely follow an authorized person into a restricted access area, or they may leverage familiarity with employees to gain entry into otherwise secured areas. Tailgating can be used by hackers to attack physical IT equipment or gain access to endpoints linked to a companys network. Tailgating can be followed by other kinds of attacks, such as malware or phishing.
Tailgating is a significant security risk for organizations and their property, equipment, data, and personnel. It can put the property, data, and occupants of an organization at risk, and it can also cost businesses huge losses in revenue from long-term damage to their brand and reputation. Tailgating can be prevented by implementing physical security measures such as biometric access control systems, visitor badges, video surveillance, and security revolving doors or portals. Organizations should also ensure that the reception area is properly staffed and that identification systems are in use. Employees should be trained to follow cybersecurity best practices and to be aware of the common ways attackers tailgate.