Connley Walker Independent Security Consulting Group Logo

Connley Walker Security Consulting Blog: Addressing Tailgating and Piggybacking: Preventing Unauthorised Entry

While robust access control systems, surveillance cameras, and security personnel are essential components of any security strategy, one often overlooked threat is tailgating and piggybacking. These deceptive tactics involve an unauthorised individual following closely behind an authorised person to gain access to a secured area. In this article, we’ll delve into the dangers of tailgating and piggybacking and explore effective strategies for preventing these security breaches.

Tailgating and piggybacking are both social engineering techniques used to bypass security measures. Tailgating occurs when an unauthorised individual follows closely behind an authorised person through a secure entry point, such as a door or turnstile, without presenting proper credentials. Piggybacking, on the other hand, involves an unauthorised person exploiting a moment of vulnerability to slip through a secure entry point while an authorised individual enters.

The consequences of tailgating and piggybacking can be severe. By gaining unauthorised access to a facility, an intruder can compromise sensitive information, steal valuable assets, or even cause harm to individuals within the premises. Additionally, these security breaches can undermine trust in the effectiveness of security measures and damage the reputation of an organisation.

Preventing tailgating and piggybacking requires a multi-faceted approach that combines technology, policies, and employee awareness. Here are some effective strategies:

  • Access Control Systems: Implement access control systems that require individuals to present valid credentials, such as keycards, biometric data, or PIN codes, to gain entry. These systems should be configured to allow only one person to enter per valid authentication.
  • Physical Barriers: Install physical barriers such as turnstiles, speed gates, or mantraps at entry points to deter unauthorised individuals from following behind authorised personnel.
  • Surveillance Cameras: Deploy surveillance cameras strategically to monitor entry points and detect instances of tailgating or piggybacking in real-time. Video analytics can help identify suspicious behaviour and trigger alerts for immediate response.
  • Employee Training: Educate employees about the importance of vigilance and following security protocols. Encourage them to challenge unfamiliar individuals attempting to gain access without proper credentials and to report any suspicious activity to security personnel.
  • Visitor Management: Implement a robust visitor management system that requires all visitors to register upon arrival and obtain a temporary access pass. Escort visitors at all times to prevent them from wandering unattended and potentially engaging in tailgating or piggybacking.
  • Security Awareness Campaigns: Conduct regular security awareness campaigns to reinforce the importance of adherence to security policies and procedures. Use posters, newsletters, and training sessions to keep security top of mind for all employees.

Addressing tailgating and piggybacking is essential for maintaining the integrity of physical security measures and protecting against unauthorised entry. By implementing a combination of access control systems, physical barriers, surveillance cameras, employee training, visitor management, and security awareness campaigns, organisations can significantly reduce the risk of security breaches posed by these deceptive tactics. Vigilance and a proactive approach to security are key to safeguarding facilities and assets from potential threats.

Contact Us

FIll out the form below and we will contact you as soon as possible

Connley Walker is an independent group of licensed security consulting professionals with engineers specialising in physical and cyber security and risk management.

Copyright ©2023 Connley Walker Holdings Pty Ltd. All Rights Reserved.

LICENCES AND REGISTRATIONS

ACT – Security Master Licence No. 17502533.

NSW – Security Master Licence No. 409109204.

NT – No licence required.

QLD – Security Firm Licence No. 3255594.

QLD – Registered Professional Engineers No. 21615.

SA – Exempt from a licence as Engineers (Security and Investigation Industry Regulations Part 2, 5 (1) (b)).

VIC – Registered Building Practitioners No. EE21166.

VIC – Private Security Business Registration No. 720-062-90S.

TAS – Building Service Provider Licence No. 363589169.

WA – Security Agent Licence No. SA56167.

CREDENTIALS AND AFFILIATIONS

ISO 9001:2015 Quality Assured.

SCEC Endorsed Security Zone Consultants (Registration Number 0075).

Pre-qualified consultants to the Victorian Government.

Pre-qualified consultants to the NSW Government.

Pre-qualified consultants to the NT Government.

Pre-qualified consultants to the Tasmanian Government.

Represent Engineers Australia on Australian Standards for Security.

Members of Australian Security Industry Association Limited (ASIAL).

Members of Australian Institute of Project Management (AIPM).

Members of Engineers Australia.

Federal Government Endorsed Suppliers.

Interested in Free Security Awareness Training?

Ensuring the safety of your business and personal space is essential. Before you go, why not join our FREE Security Awareness Training Platform?

Our training program offers:

  • Fundamental Security Practices: Learn the basics of protecting your premises.
  • Threat Identification: Recognise potential risks before they become incidents.
  • Access Control Strategies: Understand how to manage and monitor entry points effectively.
  • Emergency Preparedness: Be ready for any situation with our expert guidelines.
  • Real-Life Case Studies: Gain insights from real-world security scenarios.