{"id":19502,"date":"2022-01-11T09:11:34","date_gmt":"2022-01-11T09:11:34","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=19502"},"modified":"2025-03-07T17:01:25","modified_gmt":"2025-03-07T17:01:25","slug":"what-is-access-tailgating","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/","title":{"rendered":"What is Tailgating Attack?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">According to the <\/span><span style=\"font-weight: 400;\">Proofpoint 2019 Annual Human Factor Report<\/span><span style=\"font-weight: 400;\">, social engineering accounts for 99% of attacks in the cyber world. Cyber actors rely on humans to either click a link or perform an action to execute an attack successfully. Social engineering attacks can take on many forms, one of which is tailgating attack.\u00a0<\/span><\/p>\n<p><b>What is a tailgating attack<\/b><span style=\"font-weight: 400;\"> and how does it affect businesses? Read on to learn about <\/span><b>tailgating cyberattack<\/b><span style=\"font-weight: 400;\"> techniques, examples, and the steps to avoid them.\u00a0<\/span><\/p>\n<h2><b>What is Tailgating?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Before we dive into the prevention measures and attack techniques, it\u2019s important to answer this question: <\/span><b>What does tailgating mean<\/b><span style=\"font-weight: 400;\">?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tailgating, otherwise known as piggybacking, is one of the most common physical security breaches that affect businesses today. Tailgating attack is a social engineering practice where an unauthorized user can access a restricted area by following an authorized person.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More often than not, a <\/span><b>tailgating attack<\/b><span style=\"font-weight: 400;\"> happens due to a random act of kindness like holding a door for a visitor without ID or a stranger who poses as a worker. However, this security error can cause severe damage to both physical and IT systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While tailgating is a physical breach, it can also refer to accessing laptops, gadgets, credit cards, etc. For example, attackers can remember a keypad combination on a door, credit card PIN, or your laptop password while you\u2019re typing.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the case of the door, nothing hinders them from returning and opening it. With a credit card or laptop, they\u2019ll have to steal the items to access your files or account. When a tailgater has access to your physical systems, it can lead to further cybersecurity breaches and information theft.\u00a0<\/span><\/p>\n<h2><b>Tailgating Attack Techniques<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The first step to preventing cyber threats is understanding the techniques hackers use to execute the attack. Knowing the \u201chow\u201d will help employees stay ahead of tailgaters.\u00a0<\/span><\/p>\n<h3><b>Tailgating Employees Through Open Doors<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In a corporate setting, it\u2019s a usual practice to hold the door for the person behind you. This act of kindness can grant access to a malicious hacker aiming to steal the company\u2019s resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tailgaters always look for means to slide into the building behind employees. While the beginning of the attack might not be in cyberspace, accessing restricted areas can help cybercriminals gain more ground.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An unlocked computer, a thumb drive left unattended, an open door into a server facility\u2014 all of these have the potential to turn into a huge data breach later.<\/span><\/p>\n<h3><b>Pretending to Be a Courier<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">An attacker can pretend to be a courier trying to deliver a package to a person in the company. They may disguise themselves as anything from a pizza delivery person to a repair company staff member, or any similar service employee to gain access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If your security personnel or receptionist aren\u2019t vigilant enough, the attacker might access the company\u2019s delivery area, and from there, slide into a restricted space.\u00a0<\/span><\/p>\n<h3><b>The \u201cHands too Full\u201d Trick<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Some cyber attackers access their targeted building by carrying multiple packages in their hands (this goes well with the disguise as a delivery person). Your employees&#8217; natural urge to help a stranger can unknowingly harm the company.<\/span><\/p>\n<h3><b>The Forgotten ID Scam<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Some attackers may try to disguise themselves as an employee of your company. In most cases, these attackers pretend to have misplaced their access ID or left it at home.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sure, you must train employees not to let strangers into your office building. Still, trespassers might appear familiar with tricks like pretexting. They could even gain the trust of an actual employee and trick them into opening the door or giving up their ID.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In an organization with thousands of employees, not everyone knows each other. Thus, a \u201cJudy from accounting\u201d who knows \u201cKyle from marketing\u201d might push a trusting person to fall into the trap, even if they don\u2019t recognize the person\u2019s face.<\/span><\/p>\n<h3><b>The \u201cI Have an Appointment\u201d Pretense<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Similar to the case above, a little bit of research into a company\u2019s employees, and a trespasser might easily \u201chave an appointment with Kyle from marketing\u201d regarding \u201ca new outsourced project.\u201d This can convince the security or receptionist to grant them access to the building.<\/span><\/p>\n<h3><b>Stealing Passwords or Pins by Standing Behind a Person<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Have you ever noticed a person trying to steal your information while inputting your password or PIN on your mobile device, laptop, or ATM? This technique is called \u201cshoulder surfing.\u201d Shoulder surfers try to avoid being noticed by keeping some distance from their target. But they\u2019re attentive enough to note, and later, use the gathered information.<\/span><\/p>\n<h2><b>Tailgating Cyber Attack Examples<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">An attacker always tries to manipulate their victims through social engineering. Similar to email phishing, tailgating also exploits the human factor. It uses the natural act of kindness, the urgency element, the weirdness of the situation, or some combination of these to be successful. Here\u2019s one example of a high-profile tailgating attack case:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In 2019, <\/span><a href=\"https:\/\/www.theguardian.com\/us-news\/2019\/apr\/02\/mar-a-lago-woman-malware-chinese-passports\"><span style=\"font-weight: 400;\">a Chinese woman named Yuking Zhang was caught<\/span><\/a><span style=\"font-weight: 400;\"> while trying to enter Donald Trump\u2019s Mar-a-Lago club. She used various pretexts like a non-existent event, going to take a swim, and fake club member connections. She also used the language barrier to confuse the security guard. As a result of a search, Secret Service agents found multiple mobile devices, an external disc, a thumb drive containing malware, and two Chinese passports.<\/span><\/p>\n<h2><b>How to Spot Tailgating Attack<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In most cases, a tailgater wants access to a restricted area. The first red flag is when you notice someone loitering around or trying to rush in while you access a restricted area. Letting people in without checking their access permission could hold potential dangers to the organization.\u00a0<\/span><\/p>\n<h2><b>7 Tips to Avoid Tailgating Attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The human factor can stand in the way, so familiarizing yourself with tailgating attacks is the best way to prevent or mitigate their impact. Below are 7 tips to avoiding tailgating attacks.<\/span><\/p>\n<h3><b>Educate Employees<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Attackers leverage company employees for their success. So organizations need to conduct regular cybersecurity awareness training sessions. They must teach their staff to recognize, prevent, and deal with an attack properly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Besides other social engineering attacks, such a program should familiarize employees with questions like: \u201cWhat is tailgating attack?\u201d and \u201c<\/span><b>What is a tailgater<\/b><span style=\"font-weight: 400;\">?\u201d How do criminals execute these attacks? Their impact on business should also be a talking point.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employ security experts to train your employees and test their knowledge by simulating possible tailgating attacks.<\/span><\/p>\n<h3><b>Adhere to Security Best Practices<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Security best practices might vary depending on your company. Still, wearing a badge, checking in and out, and having a security guard at the front desk should be compulsory. Organizations can also use entry automation with biometrics, install cameras, and find other methods to keep their premises safe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employees who claim to have misplaced their badge or left it home should show other proof of employment or go home to get their access ID. Positive reinforcement also results in better security.\u00a0\u00a0<\/span><\/p>\n<h3><b>Use Multifactor Authentication (MFA)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Multi-Factor Authentication is a strong identity and access management (IAM) policy that helps prevent security threats. Organizations should introduce multiple ways to authenticate and verify their employees before giving them access to the building and other resources like applications and online accounts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With MFA, even if a person claims to have lost their access card, there are other ways for receptionists and security personnel to verify them.<\/span><\/p>\n<h3><b>Implement Smart Cards<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The use of smart cards is another anti-tailgating strategy that ensures only authorized individuals access the office premises. Smart cards usually include multiple credentials that security personnel can use to verify employees.<\/span><\/p>\n<h3><b>Use Biometrics<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">You may have a security system that uses locks, keys, PINs, or smart cards, but they can easily be forgotten, lost, or stolen. Plus, it\u2019s easy for hackers to manipulate employees into giving out their access ID or PIN.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pairing the physical access system with biometrics secures the organization even more. Using fingerprints or iris recognition on doors is a more reliable and safer way of avoiding tailgaters and managing access to your office buildings.<\/span><\/p>\n<h3><b>Limit Entry to One Person at a Time<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Multiple employees passing through an entry simultaneously can confuse the receptionist or security personnel. Attackers can easily fit into a crowd and pretend to be legitimate employees of the company. Plus, no biometrics or access control cards can protect your building if people enter in bulk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the best solutions is turnstiles\u2014an excellent way to manage access control. They limit entry to one person at a time, making it easier for security personnel to properly authenticate and verify staff.<\/span><\/p>\n<h3><b>Hire Security Guards and Install Video Surveillance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The use of video surveillance throughout your building will help identify strangers, even if they successfully enter the premises. On the other hand, posting security guards at entrances not only offers better customer service but also prevents tailgaters from gaining access to your building.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security guards also keep track of people entering the building and enforce access IDs.\u00a0<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A hacker or unauthorized person uses social engineering tactics like tailgating to manipulate victims to access restricted areas. A tailgater can pose as an employee, a vendor, or a delivery person.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations should train their security personnel and other employees on how to identify common tailgating techniques. When you notice someone strange, ensure you verify the person properly before letting them into the building.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Social engineering isn\u2019t limited to tailgating. To learn about other attack types and their prevention mechanisms, check out our previous posts. Also, keep an eye on our future ones for more cybersecurity-related articles.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the Proofpoint 2019 Annual Human Factor &#8230;<\/p>\n","protected":false},"author":5,"featured_media":19486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,289],"tags":[],"class_list":["post-19502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Tailgating Attack? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Social engineering attack methods vary. Tailgating attacks can begin outside the office building and continue in the cyberspace. Learn more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Tailgating Attack?\" \/>\n<meta property=\"og:description\" content=\"Social engineering attack methods vary. Tailgating attacks can begin outside the office building and continue in the cyberspace. Learn more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-11T09:11:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-07T17:01:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"What is Tailgating Attack?\",\"datePublished\":\"2022-01-11T09:11:34+00:00\",\"dateModified\":\"2025-03-07T17:01:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/\"},\"wordCount\":1600,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/05.01-4.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/\",\"name\":\"What is Tailgating Attack? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/05.01-4.jpg\",\"datePublished\":\"2022-01-11T09:11:34+00:00\",\"dateModified\":\"2025-03-07T17:01:25+00:00\",\"description\":\"Social engineering attack methods vary. Tailgating attacks can begin outside the office building and continue in the cyberspace. Learn more!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/05.01-4.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/05.01-4.jpg\",\"width\":1440,\"height\":910,\"caption\":\"05.01 4\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-access-tailgating\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"What is Tailgating Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Tailgating Attack? | EasyDMARC","description":"Social engineering attack methods vary. Tailgating attacks can begin outside the office building and continue in the cyberspace. Learn more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/","og_locale":"en_US","og_type":"article","og_title":"What is Tailgating Attack?","og_description":"Social engineering attack methods vary. Tailgating attacks can begin outside the office building and continue in the cyberspace. Learn more!","og_url":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-01-11T09:11:34+00:00","article_modified_time":"2025-03-07T17:01:25+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-4.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"What is Tailgating Attack?","datePublished":"2022-01-11T09:11:34+00:00","dateModified":"2025-03-07T17:01:25+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/"},"wordCount":1600,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-4.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/","url":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/","name":"What is Tailgating Attack? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-4.jpg","datePublished":"2022-01-11T09:11:34+00:00","dateModified":"2025-03-07T17:01:25+00:00","description":"Social engineering attack methods vary. Tailgating attacks can begin outside the office building and continue in the cyberspace. Learn more!","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-4.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-4.jpg","width":1440,"height":910,"caption":"05.01 4"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"What is Tailgating Attack?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-4.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=19502"}],"version-history":[{"count":2,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19502\/revisions"}],"predecessor-version":[{"id":44710,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19502\/revisions\/44710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/19486"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=19502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=19502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=19502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}