Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Education & Training

What Background Checks Miss: The Human Layer Behind Modern Screening

How to ensure your background checks aren’t missing clear red flags.

By Rachael Zerr, Contributing Writer
Giant holding magnifying glass to view businessman standing in a row
sesame / DigitalVision Vectors via Getty Images
January 22, 2026

In our modern world hiring is faster, more automated and utilizing digital space more than ever. Background checks have become both more common, and in many cases, far less rigorous.

Over the past few years, while applying for security and risk-related roles, I noticed a pattern that surprised me: many background screening vendors only asked for a few years of employment history, minimal address information, minimal educational verification, and returned results within one or two days. In contrast, I also noticed that industries with higher regulatory standards, such as finance and transportation, conduct far deeper checks that can span from weeks to months.

This discrepancy reveals a significant gap in how organizations perceive risk and raises an important question: What are these “fast” background checks missing?

The answer is: quite a lot.

Identity Is More Than a Document

One of the biggest weak spots in a rushed or automated screening is identity verification. In some systems, applicants can upload their own documents with little oversight, making it easy for expired identification cards, improper paperwork, or even forged documents to be uploaded. Trusted high security industries typically do not allow candidates to do this. Instead, they require documents to be physically inspected and uploaded by a trained screener, eliminating a major source of fraud.

This is especially important today, as we are seeing an increase in sophisticated threat actors obtaining legitimate United States employment to carry out fraud, information theft, and other insider-driven attacks, including recent cases involving foreign hackers securing roles at major American companies.

A candidate’s identity should never be verified purely virtually. Digital submission alone opens up the door to altered PDFs, borrowed documents, and misrepresented credentials. Companies that rely heavily on automation may unintentionally prioritize speed over security.

Fingerprinting: A Human Process in a Digital World

Biometric screening may seem foolproof, but fingerprints are far from “plug-and-play.” People may have worn down ridges, scars, missing fingertips/fingers, overly dry skin, or overly sweaty hands. These variables can make capturing usable prints difficult. Effective fingerprinting requires patience, proper technique, and occasional troubleshooting.

The human element cannot be automated away. A trained technician often catches things that software cannot.

While not all organizations require this level of scrutiny, the philosophy behind it is valuable: verifying character requires more than checking boxes.

Drug Testing: An Easy System to Cheat

Another area where shortcuts can undermine safety is drug screening. While many workplaces administer pre-employment drug testing, far fewer implement continuous or random drug testing, often due to cost. This creates a loophole that some candidates exploit.

In regions where certain substances are illegal, people commonly attempt to dilute their urine by drinking excessive water. Some even bring concealed fake samples into testing sites. According to research, one out of every twenty-nine corporate employees failed their random drug test in 2021. The research reports seeing post-COVID-19 fail rates rise a little over 3% compared to pre-pandemic fails.

Drug testing issues are so widespread that certain regulated fields, such as commercial driver’s license (CDL) test in the U.S., sometimes requires direct observation. College athletics faced similar issues for years; after routine urine substitutions by student athletes, the National Collegiate Athletic Association (NCAA) adopted monitored collection for select sports.

Of course, most employers cannot, and should not, monitor candidates during the process. But organizations can implement stricter procedures, longer screening periods (60-day, 90-day), partner with reputable testing facilities, and use random testing programs to maintain long-term accountability.

Social Media: The Blind Spot of Many “Instant” Checks

Despite being one of the most revealing tools available, social media is often excluded from fast, automated background checks. Yet online behavior can expose concerning patterns that never appear on a traditional background report.

At a previous employer, a candidate passed their standard screening with no issues. Out of curiosity, I conducted a deeper open-source search and immediately uncovered publicly posted drug use and inappropriate behavior. None of this had been detected by the background vendor.

If you are overlooking social media, you’re doing it wrong.

Professionals conducting deeper due diligence often maintain a separate “burner” account strictly for investigative purposes, never a personal account. One of my personal favorite tricks when it comes to social media investigations is the phone number method. The technique is to add a candidate’s phone number as a contact on a mobile device, sync the device contacts across social platforms, and see which associated accounts appear. Another trendy method is verifying a phone number through payment apps like Zelle to confirm the individual’s registered name.

These small steps can quickly expose discrepancies that warrant further review.

References, Residences and the Value of Real Verification

Another trend contributing to weak vetting is the decline of reference checks. Many companies skip checks entirely or call only generic HR lines that provide minimal information. Younger applicants may list friends as references, knowing no one will check deeply.

Some agencies take a more comprehensive approach. A police chief once described their process to me: they not only interview listed references but also ask those individuals to provide an additional reference. They attempt to contact former partners, visit candidates’ neighborhoods, and speak with neighbors. While not all organizations require this level of scrutiny, the philosophy behind it is valuable: verifying character requires more than checking boxes.

Where High Standards Make the Greatest Difference

Organizations that operate in high-risk environments like finance, pharmaceuticals, education, defense, transportation all tend to understand that background screening is not just a formality. It truly is a risk-management tool! These institutions often require:

  • Full address histories
  • Multi-layer identity verification
  • Professional fingerprinting
  • Social-media reviews
  • Verified credentials&
  • Drug testing that goes beyond a single pre-hire snapshot
  • Continuous background monitoring while on the job
  • These safeguards reduce liability, strengthen culture, and help ensure the right people are hired.

Final Thoughts

Background checks are only as strong as the standards behind them. Fast, automated systems deliver convenience, but they miss the nuanced human factors that reveal who a person really is. Identity, behavior, honesty, and consistency rarely fit neatly into a template. The most effective screening combines traditional data with human attention, patience, and curiosity.

In a landscape where threats evolve, workplace safety depends not on speed, but on depth. Strong background checks equals responsible risk management. Period.

KEYWORDS: background check employee background checks

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

R zerr headshot 2026

Rachael A. Zerr is a Fortune 500 security professional blending emergency response, intelligence analysis, and operational support. A 2024 University of North Texas graduate and former student senator dedicated to campus safety, she is now completing her M.S. in Security Management at John Jay College of Criminal Justice. Rachael holds an Associate Protection Professional (APP) certification and serves with the ASIS North Texas Chapter.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • education

    The modern approach to employee screening, vetting and background checks

    See More
  • Infinity Screening: Why Background Checks Should Never End

    See More
  • Background Screening Benchmarking Report

    See More

Related Products

See More Products
  • Physical Layer Security in Wireless Communications

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing