This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Tailgating: A Common Courtesy and a Common Risk
Access ManagementSecurity Talk Column

Tailgating: A Common Courtesy and a Common Risk

Security Talk Default
January 7, 2015
Diane Ritchey
KEYWORDS access management / access management trends / security awareness training / tailgating
Reprints
No Comments

Tailgating is one of the most common and innocent security breaches – an employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker. The problem with these lax situations and common courtesy is that they open your building to undocumented and unauthorized entry by individuals who could intend harm to your property and employees.

Read more about access management

Read more about security awareness training

A recent survey of enterprise security executives by Boon Edam Inc. offers some interesting perceptions about the risk of tailgating into facilities. According to the survey results, a majority of the respondents believe that security breaches from tailgating remain at the same level or are on the rise.  More than 70 percent of respondents believe they are currently vulnerable to a security breach from tailgating. Hitting even closer to home, more than 70 percent believed that it was somewhat likely to very likely a security breach could happen at their own facility as a result of a tailgating incident.

More than half of respondents believe the cost of a breach from tailgating to be $150,000 and up to “too high to measure.” While respondents debated over the numbers, more than 25 percent believed if someone were to tailgate into their facility and commit a violent crime or theft, the cost of the incident to their organization would be too high to measure. More than 50 percent placed the cost at more than $150,000.

How to mitigate tailgating? More than 70 percent of respondents believe a barrier of some type is the most effective way to curtail tailgating. According to the survey, while a variety of different strategies are used today, the most popular strategies (at more than 60 percent) are physical security barriers of some type and employee education.  More than 70 percent of the respondents believed that a barrier of some form was the most appropriate way to curtail tailgating, followed by a security officer and alarm. Using just a security officer alone scored less than 5 percent, the survey showed.

Surprisingly, only 15 percent of respondents said they were currently tracking tailgating incidents regularly. “While surveyors believe security breaches due to tailgating are on the rise and are deploying several strategies to combat tailgating, the big surprise is that roughly three quarters of respondents are not tracking tailgating occurrences, which could be a way to report on effectiveness or ROI and develop improvement strategies,” the survey results said.

“In summary, the majority of survey respondents appear to take tailgating and its risks very seriously and were deploying a variety of strategies to combat it, but they still consider themselves vulnerable,” according to the survey. “This suggests that the current level of security at the majority of facilities is perceived to be inadequate for stopping tailgating altogether. Since the majority of respondents believe the threat is real and potentially very expensive, this suggests that a need is not being met and investments in tailgating prevention, or increasing the level of physical security, will likely be future budget considerations.”

Dan Colin, Director Global Security and Privacy Officer for Hospira, a pharmaceutical and medical device company with headquarters in Lake Forest, Illinois, who completed the survey, told me: “Most of our plants and here at corporate utilize turnstiles to minimize tailgating. However, where we don’t have turnstiles and just card readers for access, there is always the concern for tailgaters. We have training programs for all new hires that specifically discuss tailgating as an education piece.”     

Colin noted that he’s not currently tracking tailgating at his facility, per se. “When we do have tailgating, it is addressed to the individual by the security officers and noted on their shift logs, but we do not track as a specific metric,” he said.

Last, while he’s not currently looking at a specific security technology to mitigate tailgating, he did say: “We know what the gaps are and make appropriate design and system with technology changes, but anytime you initiate such changes, it requires capital to redesign doors or entranceways to accommodate the barriers being utilized. So it comes down to appropriations of funding.”

What about you? How big of an issue is tailgating at your enterprise, and what are you and your team doing to mitigate it? Email me at ritcheyd@bnpmedia.com    

Subscribe to Security Magazine

Recent Articles by Diane Ritchey

The Road to CSO: Meet Microsoft's New Security Leader

The Next Generation of White Hat Hackers?

Best in Class: GSOCs and Global Risk Management

Unhappy New Year?

Changing Cultures, Changing Security at FM Global

Diane-2016-200

Diane Ritchey is Editor-in-Chief of Security magazine. She has an experienced background in magazine publishing, having previously served as Editor of an industry-leading business publication. Within her role at Security, Ritchey authors the annual Security 500 Report, exclusive cover stories and the monthly Security Talk column.

Related Articles

Building a Stronger Security Culture to Mitigate Risk

5 Common Types of Unauthorized Access and How to Combat Them

6 Reasons Why Your Enterprise Needs a CRO

What is a Leader?

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

security-center

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

Globe

Which Countries Have the Worst and Best Cybersecurity?

Cyber Doors

2018 Set a New Record for Security Vulnerabilities

cyber-SMB

8 Vulnerabilities Penetration Testers Recommend You Address in 2019

20180222ENR_Skyward_Drones_360x184customcontent

Events

February 19, 2019

Drones and Surveillance at MetLife Stadium

Unmanned aerial systems pose a legitimate threat to sporting events in America. The devices are not only becoming cheaper and easier to own, but technology has advanced to such a point that virtually anyone — hobbyist or terrorist — can fly one. MetLife Stadium is home of the New York Jets and New York Giants, in addition to numerous entertainment events and concerts each year.

February 26, 2019

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
View All Submit An Event

Poll

Employee Background Screening

How Often Does Your Organization Conduct Background Screening on Employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security-500

Security Magazine

SEC-Feb-2019-Cover_144px

2019 February

In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing