DEFENDER

DEFENDER

Share this post

DEFENDER
DEFENDER
Tailgating & Piggybacking

Tailgating & Piggybacking

Prevention Techniques for Access Control

David Marsh's avatar
David Marsh
Jun 10, 2024
∙ Paid

Share this post

DEFENDER
DEFENDER
Tailgating & Piggybacking
Share

Imagine walking into a secure facility unchecked, simply by following closely behind someone with authorized access. This real-world security breach is all too common; it's known as tailgating. And if someone convinces a worker to let them in, that's piggybacking.

Both are critical issues in access control that can lead to severe security lapses. As sec…

Keep reading with a 7-day free trial

Subscribe to DEFENDER to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Defender Video
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share