Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Education & Training

What Background Checks Miss: The Human Layer Behind Modern Screening

How to ensure your background checks aren’t missing clear red flags.

By Rachael Zerr, Contributing Writer
Giant holding magnifying glass to view businessman standing in a row
sesame / DigitalVision Vectors via Getty Images
January 22, 2026

In our modern world hiring is faster, more automated and utilizing digital space more than ever. Background checks have become both more common, and in many cases, far less rigorous.

Over the past few years, while applying for security and risk-related roles, I noticed a pattern that surprised me: many background screening vendors only asked for a few years of employment history, minimal address information, minimal educational verification, and returned results within one or two days. In contrast, I also noticed that industries with higher regulatory standards, such as finance and transportation, conduct far deeper checks that can span from weeks to months.

This discrepancy reveals a significant gap in how organizations perceive risk and raises an important question: What are these “fast” background checks missing?

The answer is: quite a lot.

Identity Is More Than a Document

One of the biggest weak spots in a rushed or automated screening is identity verification. In some systems, applicants can upload their own documents with little oversight, making it easy for expired identification cards, improper paperwork, or even forged documents to be uploaded. Trusted high security industries typically do not allow candidates to do this. Instead, they require documents to be physically inspected and uploaded by a trained screener, eliminating a major source of fraud.

This is especially important today, as we are seeing an increase in sophisticated threat actors obtaining legitimate United States employment to carry out fraud, information theft, and other insider-driven attacks, including recent cases involving foreign hackers securing roles at major American companies.

A candidate’s identity should never be verified purely virtually. Digital submission alone opens up the door to altered PDFs, borrowed documents, and misrepresented credentials. Companies that rely heavily on automation may unintentionally prioritize speed over security.

Fingerprinting: A Human Process in a Digital World

Biometric screening may seem foolproof, but fingerprints are far from “plug-and-play.” People may have worn down ridges, scars, missing fingertips/fingers, overly dry skin, or overly sweaty hands. These variables can make capturing usable prints difficult. Effective fingerprinting requires patience, proper technique, and occasional troubleshooting.

The human element cannot be automated away. A trained technician often catches things that software cannot.

While not all organizations require this level of scrutiny, the philosophy behind it is valuable: verifying character requires more than checking boxes.

Drug Testing: An Easy System to Cheat

Another area where shortcuts can undermine safety is drug screening. While many workplaces administer pre-employment drug testing, far fewer implement continuous or random drug testing, often due to cost. This creates a loophole that some candidates exploit.

In regions where certain substances are illegal, people commonly attempt to dilute their urine by drinking excessive water. Some even bring concealed fake samples into testing sites. According to research, one out of every twenty-nine corporate employees failed their random drug test in 2021. The research reports seeing post-COVID-19 fail rates rise a little over 3% compared to pre-pandemic fails.

Drug testing issues are so widespread that certain regulated fields, such as commercial driver’s license (CDL) test in the U.S., sometimes requires direct observation. College athletics faced similar issues for years; after routine urine substitutions by student athletes, the National Collegiate Athletic Association (NCAA) adopted monitored collection for select sports.

Of course, most employers cannot, and should not, monitor candidates during the process. But organizations can implement stricter procedures, longer screening periods (60-day, 90-day), partner with reputable testing facilities, and use random testing programs to maintain long-term accountability.

Social Media: The Blind Spot of Many “Instant” Checks

Despite being one of the most revealing tools available, social media is often excluded from fast, automated background checks. Yet online behavior can expose concerning patterns that never appear on a traditional background report.

At a previous employer, a candidate passed their standard screening with no issues. Out of curiosity, I conducted a deeper open-source search and immediately uncovered publicly posted drug use and inappropriate behavior. None of this had been detected by the background vendor.

If you are overlooking social media, you’re doing it wrong.

Professionals conducting deeper due diligence often maintain a separate “burner” account strictly for investigative purposes, never a personal account. One of my personal favorite tricks when it comes to social media investigations is the phone number method. The technique is to add a candidate’s phone number as a contact on a mobile device, sync the device contacts across social platforms, and see which associated accounts appear. Another trendy method is verifying a phone number through payment apps like Zelle to confirm the individual’s registered name.

These small steps can quickly expose discrepancies that warrant further review.

References, Residences and the Value of Real Verification

Another trend contributing to weak vetting is the decline of reference checks. Many companies skip checks entirely or call only generic HR lines that provide minimal information. Younger applicants may list friends as references, knowing no one will check deeply.

Some agencies take a more comprehensive approach. A police chief once described their process to me: they not only interview listed references but also ask those individuals to provide an additional reference. They attempt to contact former partners, visit candidates’ neighborhoods, and speak with neighbors. While not all organizations require this level of scrutiny, the philosophy behind it is valuable: verifying character requires more than checking boxes.

Where High Standards Make the Greatest Difference

Organizations that operate in high-risk environments like finance, pharmaceuticals, education, defense, transportation all tend to understand that background screening is not just a formality. It truly is a risk-management tool! These institutions often require:

  • Full address histories
  • Multi-layer identity verification
  • Professional fingerprinting
  • Social-media reviews
  • Verified credentials&
  • Drug testing that goes beyond a single pre-hire snapshot
  • Continuous background monitoring while on the job
  • These safeguards reduce liability, strengthen culture, and help ensure the right people are hired.

Final Thoughts

Background checks are only as strong as the standards behind them. Fast, automated systems deliver convenience, but they miss the nuanced human factors that reveal who a person really is. Identity, behavior, honesty, and consistency rarely fit neatly into a template. The most effective screening combines traditional data with human attention, patience, and curiosity.

In a landscape where threats evolve, workplace safety depends not on speed, but on depth. Strong background checks equals responsible risk management. Period.

KEYWORDS: background check employee background checks

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

R zerr headshot 2026

Rachael A. Zerr is a Fortune 500 security professional blending emergency response, intelligence analysis, and operational support. A 2024 University of North Texas graduate and former student senator dedicated to campus safety, she is now completing her M.S. in Security Management at John Jay College of Criminal Justice. Rachael holds an Associate Protection Professional (APP) certification and serves with the ASIS North Texas Chapter.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • education

    The modern approach to employee screening, vetting and background checks

    See More
  • Infinity Screening: Why Background Checks Should Never End

    See More
  • Background Screening Benchmarking Report

    See More

Related Products

See More Products
  • Physical Layer Security in Wireless Communications

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing